Combining Predictive Coding and Search Term
Classification in 5 Easy Steps
Robin Thompson, VP Marketing and Business Development
iControl ESI
This is the first step in a 5 step series...Stay tuned for Step 2 next week.
Introduction
So many of our colleagues in this industry
have spent decades persuading lawyers and their staffs to adopt technology and use
powerful search and conceptual classification to efficiently and effectively
manage eDiscovery projects. Just last
week, an attorney referred to predictive coding as a “new thing,” saying “So,
Walker, you’ve been hammering home that we should do a better job with search
terms, now comes this new thing “predictive coding”– what is this again and why
do you recommend we change gears?” That
became the writing prompt to distill our advice on this subject to these 5
simple steps to make your team a pro.
Those of us
who support leveraging advanced analytics technology, such as predictive
coding, are not suggesting a shift of the gears. Well, at least not some of us. Technologists (primarily) have been trying to
move lawyers away from the use of key terms as “objective” filters for some
time now. A decade or so ago, conceptual
search emerged in legal software. In
2017, the most common exchanges of filters in agreement among the parties are
date range, file type and search terms. These
search terms are tangible and objective things that the parties can exchange,
and will behave essentially the same irrespective of what platform is being
used by the parties to perform search. For
example, a search for the term “diamond” should yield the same number of
documents hit whether your platform uses DT Search, Apache Solr, or some other
search engine. For better or worse, we’ve
made lawyers like search terms. Convincing
attorneys to like search terms has taken us decades, so let’s not waste the
effort! The use of advanced machine
learning technology, reporting, and – yes - math, will make those objective
terms better. These steps are not
intended to be a comprehensive list of every step and task that should be
performed on cases involving Electronically Stored Information (ESI), as there
are literally entire books devoted to this topic. Rather, this is a short list
of those mandatory tasks that should be performed on virtually any case of any size.
Step 1: Identify the Witnesses,
Preserve and Collect the ESI
The process
begins with legal hold to make certain that relevant
documents/ESI doesn’t disappear. Legal holds
can be issued across an organization, or to only those that are anticipated to
have relevant information and facts.
There are web-based legal hold solutions that will not only automate the
process of creating legal hold, but will also help monitor compliance and
profile what information the witness(es) might have that is relevant BEFORE you
must gather their files.
The exercise
of “profiling the data” of a custodian is a great way to determine what a
specific witness has on their computer, inside email stores, file shares or where
ever relevant ESI may exist. Data profiling applications work by reading
metadata to determine file type, size, counts and so on. This information can be very handy in
determining the cost of collecting, processing, and reviewing, and helps in
forecasting a budget, defending against a potential motion to compel, or
seeking protection against overly broad requests - as if that never happens! Step 1 should include the following, at a minimum:
1. Identify witnesses that may have relevant information;
2. Issue a Legal Hold across the organization or specific to witnesses that are known to have relevant information. Many legal hold applications also provide the ability to create, send and track customizable fact based questionnaires;
3. Monitor Compliance with the issued legal
hold. We highly recommend using an automated
notification and monitoring;
4. Profile the Data of witnesses who may have relevant ESI.
Profiling the data will determine what ESI witnesses have, or have access
to and will help with precise cost estimates.
5. Preserve and/or Collect
ESI. If an organization has "preserve in place”
capability, preserve ESI for those witnesses that are expected to have relevant
ESI. Preserve in place is the ability to
prevent the deletion of email for specific custodians, for example. Some companies use “journaling” as a way to
preserve in place. If the ability to preserve
in place isn’t available, collect the ESI as quickly as possible. The longer you wait, the more likely it is
that relevant information may disappear, increasing the risk of spoliation. The delete key is not your friend! Preserve and collect broad -- collecting ESI
is the least expensive part of the process.
Next week we will cover Step 2: Dump the Junk. Your comments and opinions are welcome.
No comments:
Post a Comment