eDJ Migrated

These blogs were written between 2012-2018.

eDiscovery Tools, Trust but Verify – Mt. Hawley v. Feldman

Howard Reissner, CEO of Planet Data, forwarded me new eDiscovery decision with best practice implications, Mt. Hawley Ins. Co. v. Felman Production, Inc., 2010 WL 1990555 (S.D. W. Va. May 18, 2010). Being elbow deep in an ugly client issue, I did not get around to digesting the case until well after Ralph Losey, Craig Ball and others have properly dissected it. So I missed the scoop and have to settle for chewing over some of the crumbs in one of the more interesting recent discovery decisions. Stepping aside from the legal wrangling about privilege waiver, I always enjoy getting insight into the raw metrics and burden of litigation that can be dissected publically. Start with the fact that 1,638 GB were collected via forensic imaging from 29 custodians. That means beginning with roughly 60 GB/user. Typical processing at $350-500/GB could have run the Feldman $500-750k just to get it ready to filter and search by their provider, Innovative Discovery. Although the actual file/email count was not given in the opinion, we can roughly guess that it was between 8 and 12 million individual ‘documents’. Even assuming that you can drop 50% in system files and the usual filters, Felman was still staring at a multimillion dollar manual review.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Analysis of the AccessData CT Summation Merger

AccessData announced it will merge with CT Summation to form a single company, AccessData Group, LLC. The goal of merging the two companies is to deliver a solution capable of addressing all phases of the EDRM model. While the newly formed solution will touch the full spectrum of the EDRM, AccessData Group will face stiff competition from best-of-breed point solution providers, as well as larger enterprise software vendors, in a market where corporations are not necessarily decided on whether an integrated solution or a point solution is the right choice.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Service Provider ROI in a Tough Economy

Yesterday I was the guest speaker for the monthly meeting of Houston Association of Litigation Support Managers (HALSM). When we polled for topics of interest, the first request concerned how to position and explain the value and role of outside service providers to attorneys at the law firm or corporate legal department. The recent economic downturn put pressure on litigation support staff everywhere to do more with less. Management are asking hard questions like, “Why do we need vendors if we have you?” Or worse, “If we have to use a vendor, why do we need you?” We had the highest HALSM meeting attendance in memory with 25-30 folks packed into a large conference room for the lively discussion.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Mining the Lehman Mountains – Searching 3 Petabytes

Everyone talks about the ‘explosive growth’ of discovery collections. Every once in a while we get a glimpse behind the curtain at the sheer size and complexity of large matters. Browning Marean posed a question to the EDRM Search project that resulting in my wasting an entire afternoon dissecting the 511 page examiner’s report from In re Lehman Brothers Equity/Debt Securities Litigation, 08-cv-05523, U.S. District Court, Southern District of New York (Manhattan). Now I do love to geek out on metrics of all kinds, but what drives me is trying to understand the impact of numbers in context. In this case, we get to see the actual search criteria created by 20 Jenner & Block attorneys to find everything related to the downfall of the investment firm.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Optimized Keyword Selection – Another Component of ECA?

When lawyers begin looking at what keywords are important for identifying potentially responsive information, the process seems fairly straightforward. Look at the key issues; brainstorm on concepts, words, and synonyms; select the keywords; conduct the collection. Tracking this process, however, can be cumbersome. Imagine trying to explain how you generated a keyword list based on several hours of brainstorming without detailed notes or a virtual recording of the brainstorming sessions. Optimizing keyword selection can help to make a cumbersome process more transparent and scientific.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Examining The Need For Standardized Collection Workflows

Collection tools are sophisticated enough now that organizations should be able to centrally manage collection efforts for 90% of what needs to be preserved. There will be the need to take forensic images of certain local machines, but a good information management or information governance program should cover most organizations and make the collection process smoother, more efficient, and defensible.

By |2024-01-12T16:07:42-06:00January 12th, 2024|eDJ Migrated|0 Comments

Don’t Give Up on Custodial Self Collection

My very first Journal entry, The Myth of Custodial Selection, explored the very real discrepancy between what your designated custodians think might be relevant and reality. Now the Delaware ruling of Roffe v. Eagle Rock Energy GP, et al., C.A. No. 5258-VCL (Del. Ch. Apr. 8, 2010) seems to assert that custodian self-collection is inadequate and all collection must be done under the direct supervision of counsel. Barry Murphy tackled some of the potential implications and solutions in his article on Standardized Collection Workflows. I would like to assert the need for technology to enable custodial self collection or ‘custodial designation’ as an integral part of any preservation and collection effort. In my recent examinations of Enterprise Desktop Collection, Self Collection is the first and dominant methodology outlined. That is because even if you do a full forensic image of every desktop, I believe that you are still obligated to interview key custodians and ask them for relevant ESI. No one wants to try and explain why a reviewer missed a key document that your star witness knew was the smoking gun.

By |2024-01-12T16:07:41-06:00January 12th, 2024|eDJ Migrated|0 Comments

Desktop Collection 2.0 –Enterprise Forensics Part 2

In Part 1, we explored the basic methods of collecting from desktops in the large enterprise environment. The recent Delaware ruling of Roffe v. Eagle Rock provided a good context to discuss the potential pitfalls and necessity of custodial self-designation of potential evidence. That brings us around to the lowest risk/highest effort method, full forensic images of desktops. I want to be very careful here to differentiate a bit-by-bit image of the physical drive from the more commonly used ‘forensically sound copy’. A forensic image captures every one or zero across the entirety of the physical drive. This means that an 80 GB laptop drive will have an 80 GB forensic image, even if there are only 20 GB of files on it. A ‘forensically sound copy’ uses the operating system to capture the content (Hash verified) and the context (OS metadata) of selective active or deleted files. Now that we have made that clear, we can move on to enterprise forensic collection, which I am taking to mean the ability to collect a full forensic image without having to physically attach a write-block device.

By |2024-01-12T16:07:41-06:00January 12th, 2024|eDJ Migrated|0 Comments

Native Production and Redaction In eDiscovery

There is a need to ensure that the redaction methodology used will work for the format of data in question, and to make sure that the redaction will actually make the private text both non-visible and non-searchable. In order to select the right redaction methodology, though, organizations must know what information they have, what format it’s in, and what elements are private or privileged. That takes planning and really requires that a proactive eDiscovery initiative (and hopefully infrastructure) be in place.

By |2024-01-12T16:07:41-06:00January 12th, 2024|eDJ Migrated|0 Comments

Can Daegis/Unify Spin Gold From Straw?

The Daegis acquisition by Unify caught my attention this morning as I was coding the latest batch of news and blogs from the eDJ search engine. After the 2009 slump, I expect to see a string of consolidation and acquisition within the eDiscovery market. Knowing some of the talented folks at Daegis (including some of the best of SPI), I did not expect them to be acquired for a 1.5 multiplier. That was a shocker. Daegis reported $24 million in revenue with a healthy 27% profit for fiscal 2009. That was pretty good for last year. So why did they accept $38 million in cash, notes and stock? They are advertising it as a merger and taking the Daegis name, which indicates that they are going after the corporate eDiscovery market as opposed to the corporate archive or database support market. If that seems confusing, consider that Unify specializes in database management and migration software. Unify acquired AXS-One for $8 million in stock last June. AXS-One seemed to be struggling in the archiving market, which has been consolidating for a while.

By |2024-01-12T16:07:41-06:00January 12th, 2024|eDJ Migrated|0 Comments
Go to Top