Wednesday, February 15, 2017


Combining Predictive Coding and Search Term
Classification in 5 Easy Steps

By Mark G. Walker, VP Advisory Services and
Robin Thompson, VP Marketing and Business Development
iControl ESI

This is the first step in a 5 step series...Stay tuned for Step 2 next week.

Introduction

So many of our colleagues in this industry have spent decades persuading lawyers and their staffs to adopt technology and use powerful search and conceptual classification to efficiently and effectively manage eDiscovery projects.  Just last week, an attorney referred to predictive coding as a “new thing,” saying “So, Walker, you’ve been hammering home that we should do a better job with search terms, now comes this new thing “predictive coding”– what is this again and why do you recommend we change gears?”  That became the writing prompt to distill our advice on this subject to these 5 simple steps to make your team a pro. 
Those of us who support leveraging advanced analytics technology, such as predictive coding, are not suggesting a shift of the gears.  Well, at least not some of us.  Technologists (primarily) have been trying to move lawyers away from the use of key terms as “objective” filters for some time now.  A decade or so ago, conceptual search emerged in legal software.  In 2017, the most common exchanges of filters in agreement among the parties are date range, file type and search terms.  These search terms are tangible and objective things that the parties can exchange, and will behave essentially the same irrespective of what platform is being used by the parties to perform search.  For example, a search for the term “diamond” should yield the same number of documents hit whether your platform uses DT Search, Apache Solr, or some other search engine.  For better or worse, we’ve made lawyers like search terms.  Convincing attorneys to like search terms has taken us decades, so let’s not waste the effort!  The use of advanced machine learning technology, reporting, and – yes - math, will make those objective terms better.  These steps are not intended to be a comprehensive list of every step and task that should be performed on cases involving Electronically Stored Information (ESI), as there are literally entire books devoted to this topic. Rather, this is a short list of those mandatory tasks that should be performed on virtually any case of any size.

Step 1: Identify the Witnesses, Preserve and Collect the ESI

The process begins with legal hold to make certain that relevant documents/ESI doesn’t disappear.  Legal holds can be issued across an organization, or to only those that are anticipated to have relevant information and facts.  There are web-based legal hold solutions that will not only automate the process of creating legal hold, but will also help monitor compliance and profile what information the witness(es) might have that is relevant BEFORE you must gather their files. 
The exercise of “profiling the data” of a custodian is a great way to determine what a specific witness has on their computer, inside email stores, file shares or where ever relevant ESI may exist.   Data profiling applications work by reading metadata to determine file type, size, counts and so on.  This information can be very handy in determining the cost of collecting, processing, and reviewing, and helps in forecasting a budget, defending against a potential motion to compel, or seeking protection against overly broad requests -  as if that never happens!  Step 1 should include the following, at a minimum:

1.  Identify witnesses that may have relevant information;
2.  Issue a Legal Hold across the organization or specific to witnesses that are known to have relevant information.  Many legal hold applications also provide the ability to create, send and track customizable fact based questionnaires;


3.  Monitor Compliance with the issued legal hold.  We highly recommend using an automated notification and monitoring;
4.  Profile the Data of witnesses who may have relevant ESI.  Profiling the data will determine what ESI witnesses have, or have access to and will help with precise cost estimates. 



5.  Preserve and/or Collect ESI.  If an organization has "preserve in place” capability, preserve ESI for those witnesses that are expected to have relevant ESI.  Preserve in place is the ability to prevent the deletion of email for specific custodians, for example.  Some companies use “journaling” as a way to preserve in place.  If the ability to preserve in place isn’t available, collect the ESI as quickly as possible.  The longer you wait, the more likely it is that relevant information may disappear, increasing the risk of spoliation.  The delete key is not your friend!  Preserve and collect broad -- collecting ESI is the least expensive part of the process.


Next week we will cover Step 2: Dump the Junk. Your comments and opinions are welcome.

No comments: