Lighthouse Blog
Read the latest insights from industry experts on the rapidly evolving legal and technology landscapes with topics including strategic and technology-driven approaches to eDiscovery, innovation in artificial intelligence and analytics, modern data challenges, and more.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blog

Big Data and Analytics in eDiscovery: Unlock the Value of Your Data
The current state of eDiscovery is complex, inefficient, and cost prohibitive as data types and volumes continue to explode without bounds. Organizations of all sizes are bogged down in enormous amounts of unresponsive and duplicative electronically stored information (ESI) that still make it to the review stage, persistently the most expensive phase of eDiscovery.Data is at the center of this conundrum and it presents itself in a number of forms including:Scale of Data - In the era of big data, the volume, or amount of data generated, is a significant issue for large-scale eDiscovery cases. By 2025, IDC predicts that 49 percent of the world’s stored data will reside in public cloud environments and worldwide data will grow 61 percent to 175 zettabytes.Different Forms of Data - While the volume of ESI is dramatically expanding, the diversity and variety are also greatly increasing, and a big piece of the challenge involved with managing big data is the varying kinds of data the world is now generating. Gone are the days in eDiscovery where the biggest challenge was processing and reviewing structured, computer-based data like email, spreadsheets, and documents.Analysis of Data - Contending with large amounts of data creates another significant issue around the velocity or speed of the data that’s generated, as well as the rate at which that data is processed for collection and analysis. The old approach is to put everything into a database and try to analyze it later. But, in the era of big data, the old ways are expensive and time-consuming, and the much smarter method is to analyze in real time as the data is generated.Uncertainty of Data - Of course, with data, whether it’s big or small, it must be accurate. If you’re regularly collecting, processing, and generally amassing large amounts of data, none of it will matter if your data is unreliable or untrustworthy. The quality of data to be analyzed must first be accurate and untainted.When you combine all of these aspects of data, it is clear that eDiscovery is actually a big data and analytics challenge!While big data and analytics has been historically considered too complex and elaborate, the good news is that massive progress has been made in these fields over the past decade. Access to the right people, process, and technology in the form of packaged platforms is more accessible than ever.Effective utilization of a robust and intelligent big data and analytics platforms enable organizations to revamp their inefficient and non-repeatable eDiscovery workflows by intelligently learning from past cases. A powerful big data and analytics tool utilizes artificial intelligence (AI) and machine learning to create customized data solutions by harvesting data from all of a client’s cases and ultimately creating a master knowledge base in one big data and analytics environment.In particular, the most effective big data and analytical technology solution should provide:Comprehensive Analysis – The ability to integrate disparate data sources into a single holistic view. This view gives you actionable insights, leading to better decision making and more favorable case outcomes.Insightful Access – Overall and detailed visibility into your data landscape in a manner that empowers your legal team to make data-driven decisions.Intelligent Learnings – The ability to learn as you go through a powerful analytics and machine learning platform that enables you to make sense of vast amounts of data on demand.One of the biggest mistakes organizations make in eDiscovery is forgoing big data and analytics to drive greater efficiency and cost savings. Most organizations hold enormous amounts of untapped knowledge currently locked away in archived or inactive matters. With big data and analytics platforms more accessible than ever, the opportunity to learn from the past to optimize the future is paramount.If you are interested in this topic or just love to talk about big data and analytics, feel free to reach out to me at KSobylak@lighthouseglobal.com.ai-and-analytics; ediscovery-reviewai-big-data, blog, ai-and-analytics, ediscovery-reviewai-big-data; blogkarl sobylak
AI and Analytics
eDiscovery and Review
Blog

Cybersecurity in eDiscovery: Protecting Your Data from Preservation through Production
Now more than ever, data security has become priority number one, especially in the context of litigation and eDiscovery. And as the worlds of eDiscovery, information governance, and cybersecurity continue to rapidly converge, cybersecurity incidents are alarmingly on the rise, showcasing all of the weaknesses in an organization’s information governance system. Addressing cybersecurity continues to be a top challenge in eDiscovery. Many are unsure if their own internal processes are safe, not to mention those of the vendors who manage their outsourced eDiscovery.So, how can you protect your ESI all the way from preservation and collection to review and production? In a Law and Candor podcast episode, special guest David Kessler, Head of Data and Information Risk at Norton Rose Fulbright US LLP, discussed with our hosts the diverse set of challenges that arise with data security at each stage of the EDRM. Most understand the right methods start with implementing the fundamentals of cybersecurity, but some have learned the hard way that you can’t fix a house built on a shaky foundation after a cybersecurity disaster strikes. With the protection of client ESI first and foremost top of mind, here are the some of the most pressing cybersecurity challenges in eDiscovery as well as actionable solutions.Cybersecurity Challenges in eDiscoveryThe intersection of information governance, eDiscovery, and data security: The nature of data has evolved such that eDiscovery and information governance naturally intersect with data privacy and security. We’ve learned that issues around data access are very similar to eDiscovery issues and the next challenge is learning how to operate the areas together cohesively. In addition, with the shift to scrutiny on privacy and what can be done with personal data, now we know almost all cases that involve ESI have tremendous privacy concerns.The important role eDiscovery plays in cybersecurity: No longer are the days where confidential data relevant to litigation is primarily found in email and simply on computers. Now, data is created and stored across a wide variety of mediums and the amount of data continues to grow at an exponential rate. For cybersecurity criminals, this is a gold mine of confidential data available to steal and access.The outstanding security gaps throughout the EDRM: Historically, we’ve been focused on the responding parties’ obligations to securely undertake discovery. The business process of eDiscovery is primarily about collecting, copying, and transferring data outside of an organization, which creates concerns about securing that information at every stage of the process. Both the responding and requesting parties need to find a way to collaboratively and cooperatively work together at the beginning of a case to ensure data is protected through the entire EDRM lifecycle.The weakest part of the cybersecurity chain is when you hand over sensitive data: How do we help clients make sure their data isn’t accidentally or intentionally taken from them during the eDiscovery process? Everyone from eDiscovery vendors to law firms has an obligation to shore up their security and organizations have a responsibility to thoroughly vet those partners as they hand over their most sensitive data. In the EDRM, attention has shifted to making sure cybersecurity protections span the entire EDRM and the last step that hasn’t received much attention is making sure the requesting party is taking the appropriate steps to secure the data once they receive it.Cybersecurity Solutions in eDiscoveryShore up cybersecurity contracts and repurpose existing security riders: When an organization engages law firms and eDiscovery vendors to handle discovery, it’s important they work closely with their data security IT team. These teams can help to repurpose some of the standard security riders from other contracts and use it to create new contracts with the appropriate protections in place.Establish comprehensive protective orders at the beginning of cases: With respect to the requesting party, who you will ultimately be producing the data to, ensure that early in the case you’ve negotiated a comprehensive protective order that includes reasonable and proportionate requirements for the protection of data. In that protection order (and a step that’s often forgotten), follow up and confirm the data you produced has been deleted after a case is over.Keep open lines of communication with law firms and eDiscovery vendors: Your discovery partners understand and have a significant stake in their security reputations. They have a strong motivation to work with you to execute risk assessments and other agreements that contain the necessary security provisions to ensure your data is safe at every step of the process. Also, include a breach notification order if data is accidentally lost or there’s an attack.Focus on things you can do to strengthen your productions: Think about the most efficient ways to reduce the number of copies involved in productions where appropriate. For example, use redaction as much as possible and consequently less copies of data. Don’t produce sensitive and irrelevant portions of data – redact it instead.Ultimately, most people have become acutely aware of the vulnerabilities that exist in data security as it travels through the EDRM, and as law firms and eDiscovery vendors become accustomed to deeper vetting, it’s at the production stage where the biggest security vulnerabilities seem to remain. To get ahead of all aspects of potential cybersecurity failures, the use of well-written protective orders will get you a long way. Requirements in protective orders can ensure all parties take reasonable steps to protect data from third-party hackers and unauthorized access, as well as include protections based on encryption, access controls, passwords, etc.data-privacy; information-governance; ediscovery-reviewcybersecurity, cloud-security, ediscovery-process, preservation-and-collection, blog, data-privacy, information-governance, ediscovery-review,cybersecurity; cloud-security; ediscovery-process; preservation-and-collection; bloglighthouse
Data Privacy
Information Governance
eDiscovery and Review
Blog

Managing Your (Legal Ops) Budget with Five Simple Tips
Have you created, or were handed, a budget but you don’t know where to start? Or, have you managed a budget for a while but want some other perspectives on what to look for throughout the year? Well this is the post for you. As I mentioned in my prior post about creating budgets, I have managed budgets for a long time in legal, operations, and other departments, as well as gotten input on this topic from many peers. Below you will find five of my top tips.Align team goals with budget - The success of your budget increases if everyone is working toward the common goal of staying within that budget. As such, when creating your team goals as well as when creating an individual team member’s goals, they should all support what you have put in your budget. There are a number of ways to do this. First, you could put a specific goal – e.g., come within 5% of budget – in their personal goals. You could also tie a part of an employee’s bonus to the department meeting its budget. Second, you could make the goals a bit more indirect by having each employee have a goal around coming up with cost-savings measures. Finally, you could be even less direct by just ensuring that nobody has goals related to projects that do not have any budget and that all funded projects do have owners. I use all three of these concepts in combination to set up the department for budget success.Operationalize your budget review - Reviewing your spend (actuals) against your budget on a monthly basis is critical to being able to stay on budget. You should involve your team in these budget reviews. The agenda should include an update on the prior month’s spend, a discussion of anything unusual from the prior month, and a discussion about any expectations for the coming month. Be open during these discussions and encourage people to speak up. You want to foster a positive environment where people feel comfortable bringing up anything that will impact the budget. Every team member should understand how their work impacts the budget. Any team member heading up a particular project should understand the budget of that project and where they are vis-à-vis budget. Transparency of this information will allow people to make well-informed decisions.Constantly look for ways to get better – automation and different suppliers - Even if you are at or under budget, it is important to continuously look for ways to get more efficient with resources. This can be done in conjunction with monthly budget reviews as your team will likely have some great suggestions. There are three main questions I ask:What can be automated? What can be outsourced?Are there opportunities to get better pricing from any outsourced providers (including technology)?Of these three, I lean towards automation because of the dramatic cost savings over time, but also the additional benefits. Automation will typically have an initial cost to fund the development effort. However, that initial investment can eliminate certain resources for a long period, sometimes even bringing ongoing costs to $0. Automation also can provide information, such as auditing and data, that were not available with manual methods. For example, implementing an e-billing solution not only saves on the people cost for reviewing bills, but also gives better visibility into where the money is being spent, leading to new areas for savings.Always have a plan B and C - Things change as the year goes on – revenue may not come in as expected, there could be a global pandemic that impacts your business, or you could decide to fund a higher priority business item – and you may be asked to change or reduce your budget. This can be frustrating but you should be ready for unexpected changes. The first thing you can do to be ready is to know what you will cut first, second, and third, etc. When you have a prioritized list, you can respond to any budget cuts or freezes pretty quickly. Second, you should have alternative, cheaper ways to still move forward on your top legal department strategy or strategies. For example, instead of hiring a full-time employee to manage and implement your e-billing system, perhaps you can hire a temporary employee, consultant, or an intern to move you forward on the research and design phases. Also consider whether you can move forward with any projects in phases or by doing a scaled back proof of concept first. For example, you could procure fewer licenses of your e-billing system and implement it for only 10% of matters (e.g., litigations over $1M). Both of these moves will allow you to still advance your project, but for a lower cost. The proof of concept also has the added benefit of allowing you to demonstrate the value of the project to the business, thereby making any associated budget requests for a full-scale implementation easier to get approved.Communicate changes early - A budget is an estimate based on your knowledge at one point in time. It won’t be perfect and you will have to make changes. Make sure you understand the process to communicate those changes. As soon as you have knowledge of anything that will be significantly under or over budget, which you will likely get from your monthly budget review, make sure to communicate that. If it is something that will put you over budget, make sure to have the details about why the spend is necessary, what alternative options you have looked into, and what benefits will come to the business from this spend. The threshold for when to communicate these changes differs at each organization so be sure to work with your partners in the finance organization to understand what is expected at your organization.legal-operationsediscovery-process, legal-ops, blog, legal-operations,ediscovery-process; legal-ops; bloglighthouse
Legal Operations
Blog

Data Reuse – Small Changes for Big Benefits
What is data reuse? There are many different flavors and not everyone thinks about it the same way. In the context of eDiscovery, subject-matter specific work product in the form of responsiveness or issue coding often comes to mind and is then immediately dismissed as untenable given that the definitions for these can change from matter to matter. This is just one tiny piece of what’s possible, however. We need to consider the entire EDRM from end to end. What else has already been done, and what can be gained from it?First, there’s the source data itself. The underlying electronically stored information (ESI) is foundational to the reuse of data as a whole. Many corporations deal with frequent litigation and investigations, and those matters often include the same or at least overlapping players, i.e. the “frequent flier” custodians. This means the same data is relevant to multiple matters, which means it can be reused. There’s the potential for a one-to-many relationship here. In other words, instead of starting from scratch with each new project by going back to the same sources to collect the same data, why not take stock of what has been collected already? Compare the previously collected inventory to what is required for each specific matter, and then return to the well for the difference as needed. It may be as simple as a “refresh” to capture a more recent date range, or, even better, there’s no new collection to be done at all.Next up is the processed data. Once it’s collected, a lot of time, effort, and money are spent transforming ESI into a more consumable format. Extracting and indexing the metadata such that it can easily be searched and reviewed in your platform of choice takes real effort. Considering the lift, utilizing data that has already undergone processing makes a lot of sense. Depending on volume, significant savings in terms of timeline and fees are often realized, and this is not a one-time thing. The same data often comes up over and over across multiple matters, compounding savings over time.Finally, after processing comes review, which is where reusing existing work product comes in. This isn’t limited to relevance calls, which may or may not consistently apply across matters. There’s limited application for the reuse of subject-matter specific work product as mentioned earlier. The real treasure trove is all the different types of static work product – the ones that remain the same across matters regardless of the relevance criteria – and there are so many! One valuable step that is often overlooked is the ability to dismiss portions of the data population upfront. Often there is some chunk of data that will simply never be of interest. These are the “junk” or “objectively non-relevant” files that can clog a review. For example, automatic notifications, spam advertisements, and other mass mailings can contribute a lot of volume and rarely have any chance of including relevant content. Also, think about redactions and what often drives them: PII, PHI, trade secret, IP, etc. These are a pain to deal with, so why force the need to do so repeatedly? And, what about privilege? Identifying it is one thing, and then there are the incredibly time intensive privilege log entries that follow. These don’t change, and the cost to handle them can be steep. On top of that, they are incredibly sensitive, so ensuring accuracy and consistency is key. That’s pretty difficult to accomplish from matter to matter if you rely on different reviewers starting over each time.At the end of the day, no one wants to waste time and effort on unnecessary tasks, especially considering how often intense deadlines loom right out of the gate. The key is understanding what has already been done that overlaps with the matter at hand and leveraging it accordingly. In other words, know what you have and use it to avoid performing the same task twice wherever possible.ai-and-analytics; ediscovery-reviewediscovery-process, data-re-use, blog, ai-and-analytics, ediscovery-reviewediscovery-process; data-re-use; bloglighthouse
AI and Analytics
eDiscovery and Review
Blog

Three Steps to Tackling Data Privacy Compliance Post GDPR
Recently we took Lighthouse’s legal technology podcast series Law and Candor on the road and broadcast a special live edition to our audience straight from Legaltech. One episode focused on the issue that’s at the forefront of the eDiscovery and information governance world: data privacy compliance in the post-GDPR world. Our distinguished Law and Candor hosts spoke with special guest Kelly Clay, global eDiscovery counsel and head of information governance at GlaxoSmithKline (GSK), about the key challenges or “opportunities” that GDPR, CCPA, and other burgeoning laws around data privacy have presented, and subsequently how the associated risks have permanently shifted the legal landscape.With the two-year anniversary of GDPR’s first day of implementation right around the corner, it’s a perfect time to reflect on where we are now. Organizations around the world have become more comfortable with the idea that data governance, privacy, and security are more than just new challenges they are being forced to solve. Businesses are beginning to see the new opportunities that come from data privacy regulations as they realize the benefits that come from cross-functional stakeholders working together across all of their internal support functions.So what are organizations doing to get a handle on the information governance side of the house and ensure compliance in this post-GDPR era? Here are three steps to take on the road to continual compliance:Understand where your data resides. It might seem obvious, but the number one place to start (and some would argue the most important) is taking a detailed look at your data and understanding all of the different types your organization generates, and the various locations where it all resides. Many who have already embarked on this journey have found silos during the process and encountered complications in understanding the full extent of their data and where it is. Now’s the time to use the information you gather to create a detailed and comprehensive data map that can be easily and automatically updated as new locations and new data are constantly created.Focus on the general principles. It’s easy to get overwhelmed in the data mapping process, especially if you’re a large organization whose employees utilize many different communication methods and IT has traditionally employed disparate storage methods for that never-ending mountain of data. Once your data map is in place, take a step back and realize you can’t tackle every potential compliance issue at the same time. Instead, continue to focus on the overall general principles like understanding where the data is flowing from and where it’s going, whether it’s email, chats, or data in the Cloud.Change the narrative. Historically, Legal and IT have operated separately and handled data based on the nature of their specific job functions. For example, Legal views data and information through the lens of risk management, while IT has a different approach in how it views managing and archiving data within an enterprise. With GDPR, CCPA, and likely many more privacy regulations to come, organizations need to handle data differently and understand everyone is accountable and must work cross functionally. Key players from the technology group to the procurement team to the business strategy group must change their mindset and be mindful of how they deal with data while keeping legal risk at the forefront.Ultimately, the post-GDPR era is here to stay and organizations should treat these dramatic changes in how we view and handle data as an opportunity not a challenge. Getting a handle on how to create an effective compliance program is a team effort that requires everyone to get on the same page, and it’s particularly important to involve your key stakeholders early on in the process.More on this topic can be found in this article, How GDPR and DSARs are Driving a New, Proactive Approach to eDiscovery. data-privacy; information-governanceccpa, gdpr, cloud-security, blog, data-privacy, information-governanceccpa; gdpr; cloud-security; bloglighthouse
Data Privacy
Information Governance
Blog

Adopting a Compliant & Defensible Remote Collections Strategy
One of the unanticipated consequences of the COVID-19 pandemic and the ensuing shift of office employees being forced to work from home, is the impact on counsel who must continue to direct forensically defensible collections for eDiscovery, investigations, and regulatory response scenarios. As employees adjust to remote work, they are increasingly commingling personal data sources, home networks, and corporate data, which in turn creates a wealth of new data sources that will need to be collected as potentially-relevant ESI.In my recent webinar, I discussed this significant shift to the “new normal” of digital digital-forensics and how information governance policies and IT security practices should be proactively extended to remote employees, as well as ways to mitigate future complications around forensic collections that will now need to be almost exclusively remote. Here are a few of the most important aspects to consider on how working from home impacts digital digital-forensics, and practical workflow strategies for handling remote ESI collections.Working from Home: The Digital digital-forensics ImpactThere’s a behavioral impact that automatically comes with working entirely from home, with less delineation between the workday and home life, and subsequently more temptation to use your work laptop for personal reasons. This behavioral impact is also mirrored in the reverse scenario where personal devices become more convenient to use for work. Although we were already seeing quite a bit of intermingling of data pre-COVID-19, this habit is dramatically increasing as home has quickly become the only workplace and there hasn’t been time for organizations to adopt new IT policies to tackle these issues.With the advent of this new remote workplace era, data (mis)management will remain with us for future matters and there will be a permanent impact on collections going forward. Among the top adjustments that need to be made is custodian questionnaires must be enhanced to scrutinize whether any relevant work-related data or communications reside on the custodians’ home devices. The same scrutiny will need to be applied to personal data potentially residing on work laptops as the opportunities for this type of data intermingling or “contamination” will undoubtedly continue to increase.ESI Collections: Practical Workflow StrategiesEven though we’re currently not able to travel onsite to acquire device and data source evidence, we can continue collections by relying on sound and defensible forensic remote strategies that are already in place. Collections from the Cloud are status quo and conducted remotely by definition, but for other ESI sources, we will favor targeted and logical collections over full physical forensic images.For remote collections on premise at an office that’s closed, if there’s a skeleton IT crew in place, screen sharing can be utilized to mimic the exact scenario of a digital-forensics professional being onsite to help load a hard drive or provide access into a server. For custodians sitting at home, the same process can apply and technical guidance can be provided remotely. If shipping is a safety concern, data can be uploaded by secure encrypted file transfer protocol (FTP) using software that can resume broken uploads or by utilizing fast data transfer solutions such as Aspera. Whether figuring out a safe way to transport encrypted hard drives back and forth or using remote data transfer technology, we’ll need to plan for increased turnaround times due to varying upload speeds from home and/or decontamination procedures that are implemented for shipping protocols.Key TakeawaysAs company and personal custodian data commingling grows during COVID-19, a permanent shift is happening in digital digital-forensics and eDiscovery. From a legal standpoint, it’s settled that company-related communication on personal devices is subject to discovery, thus custodian interviews and other information-gathering techniques to identify the relevant scope of a collections effort must be enhanced. And although data preservation and evidence acquisition tasks may take longer to conduct when onsite collections is not an option, the technology is already in place to ensure forensically sound and defensible remote collections now and in the future.To discuss this topic further, please feel free to reach out to me at JBui@lighthouseglobal.com.digital-forensics; information-governancelegal-operations, digital-forensics, information-governancecloud; collections; cloud-security; bloglighthouse
Forensics
Information Governance
Blog

Now Live! Special Edition of Law & Candor
The overall impacts of COVID-19 are widespread and still very uncertain. The Law & Candor podcast team wanted to come together with this special edition to reflect on the current impacts and how they are affecting those the legal space and beyond.In this special edition, co-hosts Bill Mariano and Rob Hellewell, are joined by Lighthouse’s CEO, Brian McManus, to discuss his take on the industry impacts of COVID-19. The group discusses shifts in company priorities, common themes being heard throughout the industry, as well as the downstream implications this pandemic could have on the legal space by answering the following key questions:What are key company priorities?What are current employee safety priorities and items to be aware of?What is the industry saying?What will be the lasting impact of COVID-19 on the legal space?In conclusion, they share top takeaways from the episode. If you are interested in listening, click here. To join the conversation on Twitter, click here.Catch up on past seasons by clicking the links below:‍Season 1Season 2Season 3For questions regarding this podcast and its content, please reach out to us at info@lighthouseglobal.com.ediscovery-reviewcloud, self-service, spectra, cloud-security, blog, ediscovery-review,cloud; self-service, spectra; cloud-security; bloglighthouse
eDiscovery and Review
Blog

Prioritize Fact-Finding in Your Litigation and Discovery Strategy
A good discovery strategy goes beyond complying with production obligations. When preparing for discovery matters, law firms and legal corporate departments most often focus on developing a compliant and cost-effective responsive review capability with the appropriate expert personnel, technology, and workflows. After all, once in place, a tested responsive review capability can provide legal counsel the cost predictability, security, and control needed to focus on legal strategy early on in large litigation matters.Yet, while it is necessary to develop a reliable in-house or managed responsive review capability for document-intensive litigation, being ready for the demands of modern day discovery extends beyond complying with production obligations. Most notably, the work of fact-finding often continues well after production, and introduces its own unique complexities and opportunities requiring special tactical attention.Responsive review and finding key documents require different workflows. There is a substantive difference between identifying what is responsive for production versus honing in on the key information that ultimately decides a case or investigation. While responsive review focuses on compliance with negotiated and documented requests for production, targeted fact-finding focuses on legal hypothesis-testing and story development in an actively changing and open-ended context.As such, the mix of skills, technologies, and workflows required for responsive review does not necessarily extend beyond the production phase. Honing in on key documents and dispositive information buried in large data sets requires tactical agility and adaptation that efficient responsive review approaches limit by design in order to achieve production compliance at scale.Targeted fact-finding requires an iterative process and an expert team.A common need shared across fact-finding case teams is quick identification of key documents to help develop a robust and coherent fact-based narrative. Rather than casting a broad net to look for similarities among documents as you would do in a responsive review, fact-finding teams require an ability to sleuth through large data sets in order to identify key players, reveal hidden connections between them, and establish an overall picture and timeline of what happened.More specifically, rather than leveraging linear review workflows—even those optimized by technology-assisted review (TAR)—targeted fact-finding is best supported by iterative workflows in which attorneys and discovery experts deeply familiar with the case conduct tailored interrogations of the data to find the information that will best help with developing the case team’s understanding of the matter.Broaden the notion of discovery for better preparedness. Limiting discovery preparedness to achieving scalable responsive review gives short-shrift to developing a capacity for targeted fact-finding. Broadening the notion of discovery preparedness to include fact-finding means reassessing your discovery capabilities beyond production-oriented questions, such as what number of documents will require eyes-on review or what level of accuracy can be achieved. It makes sense to make more qualitative, legal expert-based assessments such as: Have we been able to uncover the full extent of the relevant fact pattern? How confident are we that we have connected the dots regarding who acted improperly and who had knowledge of it?To answer these sorts of questions, senior members of the litigation team need to be actively informed at a granular level regarding fact-finding approaches and outcomes. A robust and effective fact-finding function can provide a critical advantage in not only witness and trial preparation, but also in early case assessment, internal investigations, and government subpoenas, increasingly important discovery contexts to consider in light of increased regulatory, shareholder, and public scrutiny of corporate fraud and wrong-doing.For more on fact-finding, see: eDiscovery for Investigations: Different Goal, Different Approach. ediscovery-reviewblog, ediscovery-reviewbloglighthouse
eDiscovery and Review
No items found. Please try different search parameters.