Showing posts with label ediscovery. Show all posts
Showing posts with label ediscovery. Show all posts

Tuesday, March 5, 2013

eDiscovery for Small Business and Startups: Are You An Organized Data Saver?

eDiscovery for Small Business and Startups: Are You An Organized Data Saver?


Author: Eric Everson, MBA, MSIT-SE, JD Candidate*

Data touches every small business and startup alike.  While there may be a few outliers, generally every business today generates and collects data.  The founders of most startups and small businesses that I meet are primarily concerned with growing their businesses and generally do not have time to stop and concern themselves with the possibility of some future litigation.  As it turns out, preparing for the possibility of litigation can be as simple as establishing a value added electronic records management (ERM) solution for the business.

Let’s face it, as prices have come down, data storage hardware is cheap.  Today you can pick up a terabyte of external storage for under $100.  With all of this digital storage readily available, it is easy as a business manager to adopt a “save it all” mentality when it comes to data archives (email, documents, spreadsheets, reports, databases, etc).  This is where we begin our eDiscovery for startups and small businesses… become an organized data saver!

Perhaps you’ve never heard of eDiscovery or are new to the idea of data preservation in anticipation of litigation.  The truth is, many business owners learn about eDiscovery for the first time when it is raised by their attorney in response to a litigation hold notice.  As computers have streamlined business practices, an area of technology law called eDiscovery has blossomed.  In effect, eDiscovery rules subject business owners to very strict penalties for purposely deleting, damaging, or withholding data.  In eDiscovery, data is often referred to electronically stored information (ESI) and there is an abundance of legal procedure and case law that requires responsible preservation and production of this data.

One way a small business owner can protect themselves against eDiscovery penalties is to become an organized data saver.  What this requires is often simple, which is creating some organization and methodology to the data your business saves.  Some businesses are required by law to save certain kinds of data for many years and yet some data can be discarded routinely.  What you want from your ERM solution is organization that allows you to search effectively through the data that you archive and to establish a reasonable data retention policy that prevents you from creating a data landfill.  Do not simply dump your data into a hard drive and forget about it, keep it organized either by date, transaction, project, or some other criteria that fits your business.

When organizing your data retention policy consider things like whether the data is required to be stored by law for a statutory period (i.e. number of years for personnel files after termination), who created the data, how long are other companies keeping the same kind of data, what criteria is used to sort data, who is responsible for the data management and cleanup?  There are many similar questions to ask, but these few examples will get you started as you begin to become an organized data saver.

A quality ERM solution is not expensive to establish, but they do require active management which is an operational cost that every business manager should anticipate.  Not only will becoming an organized data saver help if you ever face a lawsuit, but it will also help you strategically streamline your data to grow your business today.

                                    ---------------------------------------------------------------------------------

*About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @iamtechlaw

Wednesday, January 30, 2013

eDiscovery: Microsoft Office 365 and Cloud-based eDiscovery – Office 2013


eDiscovery: Microsoft Office 365 and Cloud-based eDiscovery – Office 2013

Author: Eric Everson, MBA, MSIT-SE, *JD Candidate
 
 

About the Author: Eric Everson (Twitter: @iamtechlaw) is a software engineer turned legal scholar that has been published by a variety of technology, business, and law mediums.  A core focus of his works are the intersection of business and technology with the law.  He is available as a consultant for matters of eDiscovery (domestic and international), business legal strategy, and technology law (new products/ services analysis, risk assessment, cyber security, intellectual property, and more).    

Admittedly, as a software engineer now well consumed by the law, it is the highly complex areas of modern litigation that bring me the greatest delight.  With a focus on technology law, I regularly spend time assessing the global impact of new technologies and the legal frameworks in which they encounter.  One area that is increasingly expanding is international eDiscovery.  In this field, not only does one have to fully understand the technologies but especially the laws that regulate the production of Electronically Stored Information (ESI).  The introduction of Microsoft’s subscription-based Office 365 opens the door to a variety of complexities in eDiscovery with a heavy emphasis on cloud-based eDiscovery.

First, it should be acknowledged that Office 365 presents a shift in business model for Microsoft in two important ways.  The first way is that while standalone pricing lingers, the company has put a heavy emphasis on commercial users to transition to their new subscription model.  To propel this forward, Microsoft has limited standalone pricing to one machine, while subscription users will be able to use the services on up to five computers.  The second shift for Microsoft with Office 365 is the heavy emphasis on cloud-based computing.  For those of us who have stuck with Microsoft’s Hotmail over the years, we are already accustomed to SkyDrive and all of its work sharing capabilities.  For those less accustomed to this offering, the software takes full advantage of the interconnectivity of the web file sharing and collaborative file creation. 

Next, let’s look at the evolving landscape of software which is ever-pushing towards a cloud-based Software as a Service (SaaS) model.  This model is especially effective for computing devices (netbooks, tablets, handhelds, etc) with limited processing resources as the machines rely on a connection to the internet to create, change, and save documents.  With Office 365, the applications (Word, Excel, PowerPoint) are based on a SaaS platform and storage is complemented by SkyDrive.  The upside is that I can be a few miles off the coast of Grand Cayman relaxing in the hull net of a catamaran while collaborating on work product with an engineer in her Chicago office.  The downside… eDiscovery.

For the past several years, eDiscovery software vendors have been playing catch-up to the pace of technology (which happens to be light years ahead of the law in many regards).  Just as of now for example, social media for example is being able to be properly preserved and authenticated (of course supported by its own distinct line of case law).  Office 365 turns the now existing eDiscovery software on its head and forces us into the cloud for attempts at preservation.  The cloud however is not as pretty as a normal computer with regard to the way files are stored, archived, and shared. 

In the cloud, file encryption often comes standard adding an extra layer of penetration for eDiscovery software and global backups literally parse files into smaller data packets that are often stored on remote servers all over the globe.  There are tens of thousands of data centers around the world, a number that is only set to grow.  The line of current case law ends with the physical site of the server for purposes of establishing jurisdiction, which is archaic compared to the advances that cloud data storage have brought about.  It is very likely that a file created on a local machine in Florida could be saved only to be stored, divided into packets, and mirrored in several data warehouses that pepper the globe.

Cloud computing, especially by way of the new Office suite, pushes eDiscovery into international territory at an accelerated rate.  The new Office suite is a dream for a virtual office owner, but represents the greatest fears of eDiscovery professionals everywhere.  As a sidebar, I love Win8 so far and appreciate the global production capacity that this technology combined with Office 365 represents for a geographically diverse work team.

Increasingly, technology law is the practice of trying to force the law to keep pace with technology.

                               

About the Author: After completing the Marketing Innovative Technologies Program at The Harvard Business School, Eric Everson became the co-founder of the mobile security software company MyMobiSafe.com.  While managing and growing the startup he completed his masters in software engineering and his MBA.  He is now an emerging leader in technology law and corporate governance.  From litigation to leveraging buyouts, he is comfortable in business, technology, and the law.  *In May, 2013 Eric Everson will graduate from the Florida A&M University College of Law.

Tags: eDiscovery, Office 2013, Office 365, Microsoft, Cloud, Cloud Computing, Cloud eDiscovery, Litigation, Commercial Litigation, Preservation, Social Media, Technology Law, Technology, Win8, Windows 8, @intleDiscovery, @iamtechlaw

Sunday, December 9, 2012

Technology Law and Defensible Deletion: When Is It OK to Hit Delete?


Technology Law and Defensible Deletion: When Is It OK to Hit Delete?

Author: Eric Everson, MBA, MSIT-SE, JD Candidate May 2013

In today’s Big Data environment, most data center managers would tell you that you have to delete data in order to maintain scalability in volume management.  In contrast to this, eDiscovery advisors around the country are warning you about huge penalties that deleting data may subject you to.  So what’s the correct path? When is it okay to hit Delete?


From the onset, the truth is, there is no single answer here as every situation requires at minimum a Defensible Deletion Analysis (DDA).  A Defensible Deletion Analysis (a.k.a. DDA) is a comprehensive assessment of target data and associated metadata in comparison to the corresponding hold requirements and litigation risks.  A DDA will at minimum identify the spectrum of risk associated with deleting certain data.  When I perform a DDA, the first few questions I identify are:

·         What kind of data is it? (Personal info, financial, health-related, archived emails, essential/ non-essential)

·         What are the storage standards of this data type? (How long are you required to keep it and on what authority?)

·         What are the risks? (Identify the risks and degree to which each may exist)

·         What is the recommendation?  (Is this the type of data that can be defensibly deleted?)

Generally, what I am seeing is that businesses rarely have blanket deletion policies in place, but in so many instances there are certain data types that get deleted more regularly than others.  Archived email is a good example of data that often gets deleted, but as a result can carry profound legal consequences.  It is important to have a data preservation policy in place that not only identifies the data type, but also one that assigns a priority scheme to the data.  In such a scheme an email from a C-level employee would be assigned higher priority than perhaps an email from a non-customer facing subordinate employee.

The bottom line here is that it is okay to delete data, but at minimum conduct a DDA every time as part of your defensible deletion strategy.  In today’s preservation sensitive legal system, deleting data has become a very risky business, so be sure to take the appropriate steps before you delete anything.  As the case law demonstrates, this is just as important for start-up businesses as it is for well established industry titans.  We have but just entered the threshold of the Big Data environment and in this kingdom Delete is a 6-letter word with serious consequences.

#eDiscovery

Are you on Twitter?  Follow me @IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Tags:  ESI, Defensible Deletion, eDiscovery, Delete, Preservation, Big Data, Data Risk, Data, Defensible Deletion Analysis, Archived email, data types, technology law, Preservation Policy, data center, data center management     

Wednesday, November 14, 2012

In-House eDiscovery and Data Preservation: Litigation Hold, Where is Your Data?

In-House eDiscovery and Data Preservation: Litigation Hold, Where is Your Data?


Author: Eric Everson, MBA, MSIT-SE, J.D. Candidate May 2013

Perhaps the most frightening phrase in-house counsel can hear today is “litigation hold.”  Where do you start? Who do you call? How do you preserve all of the data? How will this impact operations? … before you go into full blown meltdown, let’s start with the most important question first: Where is your data?
 

When approaching a litigation hold, understand that data management is a profession within its own right.  In an age where data fragmentation and cloud computing can quite literally have data scattered methodically all around the world, the first step in complying with a litigation hold is understanding where the data actually is.  This is likely to result in a different answer every time you encounter it, so take the time to understand your data and its location at the frontend of each litigation hold.  To best understand where your data is, you should start by seeking answers these core questions:    

Who manages the data?  This will be different for all organizations.  Some organizations may have a smaller IT team that handles all matters of data storage and archiving whereas, other Big Data companies may have entire business units or third-party service providers that help manage the data.  It is important to identify who “owns” or otherwise has the principle responsibility for the data that is the subject of your litigation hold.  Finding this person or team can be a process, but often nothing beats some old fashion telephone calls.  As a matter of developing credibility within your IT organization, I recommend contacting your local IT personnel first and working through contacts by way of internal referral.  This will get you more acclimated to the IT lingo and will help you the next time you have a litigation hold too… there will always be a next time. 

What data is to be included in the hold?  The biggest mistake in-house counsel can make is overreacting to a litigation hold.  Remember that the best defense A litigation hold does not validate you standing atop the desk declaring “Stop the Presses!”  Be cognizant that what you are seeking 99% of the time when processing a litigation hold is considered archive data (as compared with real time data).  This means that you never need to bring operations to a screeching halt, but rather must identify the data with a degree of particularity that is the actual subject of the litigation hold.  Know what you are seeking.  This means familiarizing yourself with more techie lingo like file types, indexing, and often understanding your Database Management System (DBMS).  This will all help you in exploring your preservation options and will help you hone in on where the data is actually located.      

Where is the data actually located?  Don’t get frustrated when personnel from IT makes a statement like, “The data is everywhere man.” or “Dude, it’s somewhere in the cloud.”  As frustrating as this may be as in-house counsel, this may be a very accurate statement depending on the physical structure you are facing in your company’s data management.  In fact, it may be a very telling observation for instance, if your company is using distributed data centers and applies a data fragmentation strategy to better protect the data.  What you need to ultimately get to, is where the data is physically located.  The data will be easy enough to identify by its IP address (which is essentially like saying its digital location) but it is best if you can drill deeper and identify down to the physical building, rack, and shelf that the physically stores the data.  Knowing where you data is will help you better manage its preservation.

Now that you have answered these core questions, you are on your way to better executing the litigation hold.  A litigation hold is not something to take lightly, but if systematically approached each time it can be a much less overwhelming process.  To improve this process looking forward, you may also seek to implement a data management policy that outlines defensible systematic data archiving and removal protocols.

 

 #eDiscovery

Are you on Twitter?  Follow me @IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  As a software engineer, turned law student, Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Tags:  Preservation, Litigation Hold, Data, Data Center, DBMS, eDiscovery, Data Storage, Big Data, eDisclosure, in-house counsel, data fragmentation, Archive, File type, technology law, Eric Everson    

 

 

Tuesday, November 13, 2012

Fender Guitars Plugs-in with Apple: Are Your Guitar Chords Discoverable?

Fender Guitars Plugs-in with Apple: Are Your Guitar Chords Discoverable?


Author: Eric Everson, MBA, MSIT-SE, J.D. Candidate May 2013

The coveted icon of music industry guitars, Fender, unveiled its latest foray into technology today.  The guitar company has officially announced a new model that comes with the ability to connect directly to iOS devices like the iPad and iPhone (and of course Mac computers) via USB.

 

With eyes on the future of the intersection of copyright law and technology law, does this innovation mean that guitar chords will become discoverable by virtue of eDiscovery?  eDiscovery refers to an area of litigation where electronically stored information (ESI) enters the legal process.  Imagine the scenario where two artists are battling out who the first author of the song was and it becomes immediately apparent how metadata (data about data which often includes information such as the author, creation date, time stamp, etc.) regarding the chord patterns could be legally relevant.  Perhaps only the future will tell, but this union between Fender and Apple certainly strikes a chord!

As PC Mag notes, “Ever since the debut of the iPad, third-party accessory makers have worked to produce a wide range of add-ons and gadgets designed to allow musicians to take their studio sessions mobile. From specialized adapter cords to cleverly constructed interface jacks, in recent years the professional music community has become accustomed to using these devices to record sessions directly to the iPad and iPhone. Now, at least in the case of guitar players looking to go digital, the new Fender instrument essentially eliminates the need for many of these clunky accessories.” (Ref: http://www.pcmag.com/article2/0,2817,2412051,00.asp)  With the ubiquity of the iPad in the deepest recesses of the professional music community, it seems that the likelihood of such data becoming part of litigation is but only a matter of time.

In the immortal words of Foreigner’s Jukebox Hero, “And that one guitar made his whole life change.”

#eDiscovery

Are you on Twitter?  Follow me @IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Tags:  Fender, Fender Guitars, Apple, iPad, eDiscovery, eDisclosure, Copyright, Law, Tech Law, Technology Law, Preservation, ESI, Electronically Stored Information, Music Law, Entertainment Law   

Monday, November 12, 2012

eDiscovery in U.S. Federal Court: What ArrivalStar Means to You.

eDiscovery in U.S. Federal Court: What ArrivalStar Means to You.

Author: Eric Everson, MBA, MSIT-SE, J.D. Candidate May 2013


The thing I hear the most from attorneys is how complex and complicated eDiscovery is making litigation.  The truth is that eDiscovery can be both complex and complicated, however many courts and jurisdictions all over the world are working through it every day.  One such example via an Amended Order (2012 WL 3590414) that hails from Judge Allegra is one of special import for those facing eDiscovery in U.S. Federal Court: ArrivalStar S.A. v. The United States of America (2012 WL 3590414).

This Amended Order published August 20, 2012, irons out some very fundamental aspects of eDiscovery for litigants in U.S. Federal Courts by way of 15 key points:

1. This Order supplements this court's discovery rules.

2. Generally, the costs of discovery shall be borne by each party, subject to the provisions of RCFC 26(b)(2)(B) and 37.

3. Production requests under RCFC 34 and 45 involving electronically stored information (ESI) shall not include metadata absent a showing of good cause (e.g., that questions exist concerning the authenticity or authorship of email). (Emphasis added)

4. Email production request shall only be propounded for specific issues, rather than general discovery of a product or business. Subject to paragraph 3, the production of email shall not include metadata so long as the following information fields are otherwise apparent: date sent, to, from, cc, and any attached filed(s).

5. Email production requests shall be phased to occur after the parties have exchanged initial disclosures and basic documentation about the patents, the prior art, the accused instrumentalities, the relevant finances, as well as the technology systems involved with email that is reasonably anticipated to be relevant. While this provision does not require the production of such information, the court encourages prompt and early production of this information to promote efficient and economical streamlining of the case.

6. Email production requests shall identify the custodian, search terms, and time frame. The parties shall cooperate to identify the proper custodians, proper search terms, and time frame.

7. Each requesting party shall limit its email production requests to a total of eight custodians per producing party. The parties may jointly agree to modify this limit without the court's leave. The court shall consider contested requests for additional custodians, upon showing a distinct need based on the size, complexity, and issues of this specific case.

8. Each requesting party shall limit its email production requests to a total of ten search terms per custodian per party. The parties may jointly agree to modify this limit without the court's leave. The court shall consider contested requests for additional search terms per custodian, upon showing a distinct need based on the size, complexity, and issues of this case. The search terms shall be narrowly tailored to particular issues. Indiscriminate terms, such as the producing company's name or its product name, are inappropriate unless combined with narrowing search criteria that sufficiently reduce the risk of overproduction. A conjunctive combination of multiple words or phrases (e.g., “computer” and “system”) narrows the search and shall count as a single search term. A disjunctive combination of multiple words or phrases (e.g., “computer” or “system”) broadens the search, and thus each word or phrase shall count as a separate search term unless they are variants of the same word. Use of narrowing search criteria (e.g., “and,” “but not,” “w/x”) is encouraged to limit the production.

9. Before seeking to modify the limits specified in paragraphs 7 or 8, the parties are encouraged to engage in sampling under RCFC 26(b) and 34(a)(1)(A).

10. Pursuant to Fed.R.Evid. 502, the production of documents and data pursuant to this Order shall not result in the waiver of the attorney-client privilege or work-production protection as to those documents and data. Also, the production of privileged or protected documents or data under this Order shall not result in the waiver of the attorney-client privilege or work-product protection as to those documents and data in any other federal or state proceeding.

11. If the producing party determines that it has produced a document or data to which it wishes to assert a claim of privilege or protection, the counsel for the producing party shall notify the recipient promptly of its claim. As part of the notification, the producing party's counsel shall identify, by Bates number(s), the document(s) as to which the producing party is asserting a claim of privilege or protection.

12. The recipient shall notify the producing party's counsel upon identification of any document(s) or data which appears to be potentially privileged or protected. Such notification shall not waive the recipient's ability to challenge any assertion of privilege or protection made by the producing party as to the identified document(s). As part of the notification, the recipient shall identify, by Bates Number(s), the document(s) or data at issue. The recipient shall segregate the specified document(s) or data, as well as any copies thereof, from the other materials, and the recipient shall not use the information in the potentially privileged or protected document(s) or date, except as provided by RCFC 26(b)(5)(B), for a period of 14 days after the date on which the recipient notifies the producing party's counsel. Within the 14–day period, or any other period of time agreed to by the parties, the producing party shall determine whether it will assert a claim of privilege or protection as to the identified document(s), and its counsel shall notify the recipient of its determination.

13. Upon receiving notice of a claim of privilege or protection by the producing party regarding a produced document or data, the recipient shall segregate, with promptness and in accordance with RCFC 26(b)(5)(B), the specified document or data, as well as any copies thereof, and the recipient shall not use the information in the specified document or data, except as provided by RCFC 26(b)(5)(B), until after the claim is resolved. If the court upholds—or if the recipient does not challenge—the producing party's claim or privilege as to the produced document or data, the recipient shall return or dispose of the specified document or date, as well as any copies thereof.

13. The parties agree to exchange ESI in accordance with the following provisions. All ESI will be produced either in their native file format or in PDF or TIFF format according to the preference of the producing party except that in the case of ESI for which the native file format is Microsoft Office Excel or other spreadsheet software (e.g., Lotus 123 or Quattro Pro), such ESI shall be produced in its native file format. In producing ESI PDF or TIFF format, however, the producing party shall not remove or reduce any word searching capabilities present in the underlying ESI's native file format. The parties may, by agreement, modify the formats prescribed by this paragraph.

15. This Order may be modified by the court for good cause. The court will be inclined to grant any modification jointly proposed by the parties.

Footnote: The order contains some of, but not all, the provisions from the Model Order drafted by the E–Discovery Committee of the Federal Circuit Advisory Council. See http://www.cafc.uscourts.gov/images/stories/the-court/Ediscovery_Model_Order.pdf  The court also considered the Model Order drafted by the United States District Court for the Eastern District of Texas on this subject, see http://www.txed.uscourts.gov/page1.shtmil? location=rules, as well as recent commentary on this subject, see Daniel Garrie, “The E–Discovery Dance for Patents: Changing the Tune,” http://www.law360.com/articl es/350842/the-e-discovery-dance-for-patentschanging-the-tune.

I know that for some, posting all 15 of these key points only further muddies the water, but for others it likely brings some clarity.  If nothing else, ArrivalStar gives you a place to start from when facing eDiscovery in Federal litigation.  I added emphasis to number 3, as it carves out an exception against providing metadata on RCFC 34 (ESI) and 45 (Subpoenas) requests.  The flag of caution that I would raise here is in producing ESI in something other than native format.  When it comes to today’s eDiscovery software, native format is king and to accept anything less, is a litigation decision that only you can make for yourself.

eDiscovery is here to stay, so little gems like ArrivalStar help to resolve some of the sticky issues therein.  It is important when working through matters of eDiscovery to understand what you are agreeing to and what impact that may have on your case.  While many cases will not turn on metadata, understand that there will be those exceptions where the metadata says it all.

#eDiscovery

Are you on Twitter?  Follow me @IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Tags:  ArrivalStar, eDiscovery, Discovery Agreements, Clawback, Federal Rules of Civil Procedure, Legal Hold, ESI, Patent Law, Technology Law, modified file formats, TIFF, PDF, .XLSX, RCFC 26, Privilege   

Monday, October 15, 2012

Everson On eDiscovery: Understanding Predictive Coding

Everson On eDiscovery: Understanding Predictive Coding

Author: Eric Everson, MBA, MSIT-SE


(About the Author: Eric Everson is a software engineer turned law scholar.  He is currently a 3L at Florida A&M University College of Law where he serves as the President of the Electronic Discovery Law Student Association.)

The specialization of eDiscovery is rapidly emerging as one loaded with acronyms and unique terminology; as practitioners terms like TAR (technology assisted review), CAR (computer assisted review), or intelligent review get tossed around in exchange for a process also known as predictive coding.  Don’t let this technical sounding term scare you, as understanding at least the basics of predictive coding can have a major impact on your litigation costs.

First, what is predictive coding?  To define it broadly, predictive coding is a machine- learning process wherein software is used to intake documents to build a training set which is then used to model the data to establish patterns.  These patterns are used to assign prediction scores which allow us to gauge the computer’s statistical accuracy.  Here is a great way to think of it:

In the midst of discovery between two corporations, 800,000 documents are produced for review.  You know you don’t need all 800,000 of them and in fact there are probably only about 80 files that are truly going to be valuable as evidence in your matter.  Predictive coding is the process that allows you to put a computer to task for accurately narrowing these documents to a more manageable volume.  You do not load all 800,000 documents from the beginning, first you start by training the software with what are called training sets.  These training sets are very important because this is where we get our accuracy percentage which we will use to narrow the volume of documents.  Once you have your training sets established, you decide which percentage (also known as the prediction score) will get you closer to the 80 documents you want from the mountain of 800,000.  A good measure to start with might be a prediction score of 75%; this will likely narrow your 800,000 documents to 8,000 and from there you can retrain the software to narrow even farther as you work your way toward the 80 documents you need.      

Next, why do you care about predictive coding?  The bottom line is drawn from that age old adage, “time is money”.  Why would you spend time (or money) on having lawyers or paralegals try to work their way through a mountain of 800,000 documents?  With predictive coding software, we divert these resources from this part of the discovery process and put the computer to task.  A single successful law suit that utilizes predictive coding software will pay for the software many times over.  It is an investment that law firms cannot afford to miss in an environment where the volume of digital data is predicted (pun intended) to multiply 50 times over the next ten years.  

Finally, when do you need predictive coding software?  The thing about predictive coding software is that it is a tool that can be extremely valuable under the right circumstances.  Predictive coding is not always necessary in a law suit.  There may not be a huge number of files subject to the litigation or alternatively a keyword search may be equally sufficient given the context of discovery.  It is important to know that predictive coding software is a tool that is available when the right circumstances arise.

In conclusion, predictive coding offers a technology-based approach to reducing the costs associated with complex litigation.  We are at a time in history when terms like cloud computing and big data are being increasingly used.  Additionally, given new mediums of content generation (email, text, images, video, tweets, likes, +1’s, shares, etc) the volume of data is explosive.  Learning to use tools like predictive coding software today, will prepare you to litigate in the face of big data tomorrow.  

#eDiscovery

Are you on Twitter?  Follow me @IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law where he will graduate in May 2013.  Prior to law school he earned an MBA and Masters in Software Engineering while working for ten years in executive leadership within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Sunday, October 14, 2012

International eDiscovery in Pharma Litigation: Tackling Big Data in Big Pharma Law.

International eDiscovery in Pharma Litigation: Tackling Big Data in Big Pharma.

Eric Everson, MBA, MSIT-SE, Juris Doctorate Candidate*


Let me start by saying this bluntly, sometimes pharmaceuticals kill people.  If they don’t cause death, they can certainly cause serious permanent bodily damage.  Drug companies today are major multinational corporations that calculate certain risk variables against their potential profit with the expectation that the mountains of technical data involved will deter legal action.

The variable that these big pharma drug companies cannot ignore is the increasing sophistication of big data analytics tools that are increasingly being tailored to the legal industry.  With advances in Technology Assisted Review (TAR) and predictive coding, sorting through terabytes or even petabytes of data can be reduced to hours compared to the months that it used to take.

As law firms increasingly invest in eDiscovery teams that specialize in finding the proverbial needle in the haystack, big pharma is no longer able to hide behind dense mountains of data.  Technology specialists are infiltrating the practice of law ensuring that what is digital becomes discoverable as evidence at trial.  This specialization is accelerating the pace at which pharma law suits can be thoroughly developed and made ready for trial.  Technology efficiency in the practice of law is quickly becoming a threat to big pharma. 

As multinational enterprises, big pharma companies are also finding that the open discovery process applied in the American court system is becoming heavily influential in foreign courts too.  This means that even in courts where privacy once prevailed in favor of the drug companies, electronic disclosure is rapidly becoming par for the course.  Though cloud-based technology may provide advanced data archiving across an expansive global network, the consolidation and retrieval of such data is likewise advancing.  This accessibility and ease of data processing is rapidly creating a very hostile legal environment for big pharma.

eDiscovery software is rapidly accelerating the lifecycle of drug law suits and advances in international legal frameworks that support the eDiscovery process are forcing a change in the way big pharma creates and distributes new drugs.  With a variety of software companies focusing in on the development of eDiscovery tools, the lifecycle of big pharma law suits will only continue to diminish. These efficiencies will not only result in positive responses by drug companies to ensure quality, but will also facilitate justice for all those harmed by dangerous pharmaceuticals.         

#eDiscovery

@IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law.  Prior to law school he earned an MBA and Masters in Software Engineering while he tenured ten years of executive leadership in the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery        

Sunday, September 30, 2012

eDiscovery Software: A Presumption of Ignorance

eDiscovery Software: A Presumption of Ignorance


Author: Eric Everson, MBA, MSIT-SE. J.D. Candidate 2013*


Over the past five years, the cost of eDiscovery has skyrocketed.  With litigation support services and software in this area proliferating, a lack of technology sophistication among attorneys has become the keystone of what might be seen as price gouging. 

Taking a quick survey of the eDiscovery software market, it is easy to see that there are an abundance of software vendors fighting for market share.  With vendors taking a multitude of approaches to achieve supremacy in this niche, these companies are lining their pockets by preying on a lack of technology sophistication in the legal profession.

How can lawyers keep the costs of eDiscovery under control?  Here are three first steps that will help keep the costs of eDiscovery manageable: 

Learn the Lingo:  Anyone who has spent any time in the IT department knows that computer people speak their own language.  In order to optimize the expenditures of technology spending, it is paramount to understand fundamental concepts that are driving the eDiscovery environment.  Comfort with terms like SaaS (Software as a Service), COTS (Commercial Off The Shelf), Gigabytes, Terabytes, Predictive Coding, Freemail and Social Media Collection, Culling, Hash Values, Filetype, and many more are paramount to navigating this environment successfully.  eDiscovery presents the chasm where cutting edge technology intersects the practice of law.  Taking the time to learn this new language today is the key to winning the cases of tomorrow.                  

Ask More Questions:  What separates good attorneys from the rest is often their ability to ask the right question to the right person.  Software sales hinge on selling miracle solutions, but it is by identifying the limitations of software that we expose its true value to our business.  To begin with, understand that there is no one size fits all eDiscovery software.  It is not uncommon to use several different software tools in the execution of an eDiscovery project.  Make sure the questions you are asking fit the needs of your eDiscovery team.  Start getting familiar with the terminology and see what charges apply to which services.  Start frame cost negotiations through the lens of cost per gigabyte, rather than by document or word count.  Start asking about the entering variables of the software algorithms; if you understand how the software works you can better gauge its value to your organization.

Embrace the Technology Law Department: The term “technology law” is confounding to many attorneys because it sounds like such a broad concept.  The truth is that the most effective organizations are going to be those that embrace a technology law department in their organizational structure.  Technology law is the umbrella that various tech-focused teams fall under.  Some of the teams that you may see within a technology law department might include the following teams: eDiscovery, Privacy Compliance, Intellectual Property, Social Media Governance, Cyber Crime, eBusiness Transactions, and more.  Fundamentally, the most productive technology law departments are those organized as profit centers rather than cost centers to the organization.  By adopting a technology law department, law firms centralize the technological expertise and consolidate the technology expenditures of the organization.  With centralization, there is more opportunity to leverage technology costs that law firms face considering a future hinged upon technology competence.   

Remember also that the eDiscovery market is full of vendors and they are willing to fight each other for your business.  There is no one size fits all eDiscovery solution, so do not hesitate to ask for trial versions and cost quotes that you can compare against others in this niche.  Buying the right eDiscovery software for your law firm is like buying a new car; it can be a sizable investment, but the more informed you are the more leverage you have to negotiate.  The vendors prevail in a market where a presumption of technology ignorance overwhelms. 

#eDiscovery #infosec #bizlaw #ITLaw #TechnologyLaw #IPLaw #software

---------------------------------------------------------------------------------

About the Author:  *Eric Everson is a 3L law student at Florida A&M University – College of Law.  He currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law. Prior to law school he earned an MBA and Masters in Software Engineering while serving ten years of executive leadership in the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Follow @IntleDiscovery.        

Wednesday, August 8, 2012

Recent Cases: Federal Holding Helps Protect Software Developers

Recent Cases: Federal Holding Helps Protect Software Developers


Author: Eric Everson, MBA, MSIT-SE (Juris Doctorate Candidate, May 2013)

As a software engineer turned law student, I know first-hand how difficult it can be to protect your software in the marketplace.  By its nature, software is difficult to protect, but a recent Federal Court Ruling provides new teeth to the patentability of software.

The case is Ultramercial, LLC v. Hulu, LLC, 657 F.3d 1323 and the new teeth come in the form of a new two prong test aimed at helping developers protect their software.  This case hinged on the principle of the patentable subject matter test, which is essentially serves a screening function in patent law.  Traditionally, software has been analyzed under a “machine-or-transformation” Under that test, a computer program was patentable if and only if “(1) it [was] tied to a particular machine or apparatus, or (2) it transform[ed] a particular article into a different state or thing.”  The leading case on this subject has been The Supreme Court case, Bilski v. Kappos

Ultramercial, put took Bilski’s to a new level improving greater patentability of computer programs by identifying and applying two new factors: (1) the programs’ requiring complex computer programming and (2) the programs’ use of the internet and of a cybermarket environment.  This development stands to help software developers secure patentability while giving them greater leverage against patent infringement. 

What we haven’t seen in the case law to date is how this new test will be applied to the mobile applications software environment.  Nonetheless, there are several apps that I can think of that fall perfectly under this new umbrella of software patentability.  This comes as great news as the software industry has recently taken aim on improving intellectual property positions. 

Ref:

Harvard Law Review, Vol. 125:2167, PATENT LAW — PATENTABLE SUBJECT MATTER — FEDERAL CIRCUIT APPLIES NEW FACTORS IN DECIDING PATENTABILITY OF A COMPUTER PROGRAM. — Ultramercial, LLC v. Hulu, LLC, 657 F.3d 1323   

#eDiscovery

@IntleDiscovery

---------------------------------------------------------------------------------

About the Author:  Eric Everson is a 3L law student at Florida A&M University – College of Law.  Prior to law school he earned an MBA and Masters in Software Engineering while working nearly ten years in executive leadership positions within the U.S. telecommunications industry.  The views and opinions presented in this blog are his own and are not to be construed as legal advice.  Eric Everson currently serves on the Board of Governors for The Florida Bar Young Lawyers Division Law Student Division and is the President of the Electronic Discovery Law Student Association at Florida A&M University – College of Law.  Follow @IntleDiscovery