SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Legacy Data Remediation: A Practical Approach
Presented to the Association of Litigation Support Professionals
                                     Wednesday, March 30, 2011
Today’s Panel
Andy Cosgrove
Partner, Redgrave LLP
acosgrove@redgravellp.com


Christian Rummelhoff
Senior Analyst, Redgrave LLP
crummelhoff@redgravellp.com


Diana Fasching
Senior Analyst, Redgrave LLP
dfasching@redgravellp.com

                                               2
Presentation Goals

• Gain legal and technical perspectives into a legacy
  data remediation project

• Identify unique issues associated with the remediation
  of paper and electronic legacy data

• Introduce ways to manage costs and limit burdens on
  everyday business operations




                                                           3
Top 5 Reasons to Take Notice

TOP   #5) Litigation Costs

      #4) Litigation Risks; Why Keep Tomorrow’s
          Smoking Gun?

      #3) Reputation Risks; The WikiLeaks Effect

      #2) State & Federal Privacy Regulations

      #1) Retention Costs; The Box Burden

                                                   4
Re-Defining Legacy Data

Paper:                               Electronic:
•   Paper files, Photographs,        •   Old Backup Tapes, Backups
    Marketing Materials, and Other       Made Prior to Data Migration
    Hardcopy Documents               •   Orphaned ESI (e.g.
•   Materials Stored On and/or           departmental file shares)
    Offsite (e.g. Iron Mountain)     •   Inactive/Decommissioned
•   Documents in the Possession          Servers
    of Third Parties                 •   Retained Collections of Hard
                                         Drives, CDs or other Media
                                     •   Data in the Possession of Third
                                         parties

                                                                           5
A Process for Addressing Legacy Data
        Iterative                    High-Level                 Risk-Focused

  Identify Disposition            Understand Data           Prepare Information
      Constraints                    Store(s)                 for Comparison
- Retention Obligations      -   Origins                    - Preservation Matrix and
- Statutory, Regulatory,     -   Date Ranges                  Materials Index
  Common Law Requirements    -   Formats                    - Similar Measures Allow
- Contractual Requirements   -   Content                      Direct Comparison
- Legal Hold Obligations     -   Custodian




  Disposition of Data        Apply Risk Assessment
                               (Reasonable Investigation)
                             - Is Info Likely Relevant?
                             - Is Info Likely Unique?
                             - Duty to Preserve/Maintain?


                                                                                        6
Remediation Framework/Considerations
•   3 Key Considerations: Iterative, High Level, Risk Focused
•   General Tips
    –   Work From Available Information; Infer Where Reasonable
    –   Identify Best Value Approaches to Additional Investigation
    –   Document Each Step

•   Identify Deletion/Destruction Constraints
    –   Identify/Clarify Constraints at Issue Using Measurable Descriptors
•   Understand Data Stores
    – Origins, Date Ranges, Formats, Content, Custodian
    – Key Differences in Population – Breakdown Material into Groups
    – Additional Investigation: Sampling, Interviews, Database Mining

•   Prepare Information for Comparison
    –   Constrains and Materials - Use Same/Similar Descriptors
•   Apply Risk Assessment to Identify Disposable Information
                                                                             7
Paper – A Real World Example
                         Situation    Process    Resolution


• Fortune 250 company with over 50K boxes of hard
  copy paper records eligible for disposition under the
  record schedule

• Desire to dispose of material not subject to legal hold

• Significant information available about the material in
  the boxes; less information available on open legal
  holds

• Cost of assessment needed to be proportional to the
  cost of storing the material
                                                              8
Paper – A Real World Example
                                   Situation         Process        Resolution


•   Validated information about the materials
    – Sampled boxes to confirm accuracy of indices
    – QC missing and suspect information (e.g., dates)
•   Gathered information regarding legal holds
    – Reviewed all open holds and used available matter reporting capabilities
    – Follow-up
•   Created “Preservation Matrix”
    – Consolidated holds into manageable number of categories
    – Each category had as broad a scope as the sum of the component holds
    – Primary considerations: Record Code, Date Range; Also Geography,
      Department,
    – Obtained case-team sign-off on hold scope assumptions
    – High quality of indices meant no need for equivalent categorization of
      material
•   Iterative, Risk-Based Assessment
                                                                                 9
Paper – A Real World Example
                                 Situation         Process        Resolution


• Recommended reasonable and legally defensible
  disposition of specific material
   – One third cleared at the first iteration (Record Code)
   – Another third cleared at the Record Code by date iteration
   – Final third held by a handful of cases requiring case-specific additional
     follow-up (collection, case team identification of relevant materials)
• Other significant highlights:
   – Process from took longer than originally planned –the evolving hold
     environment (as cases open/close) complicated analysis
   – Outside counsel required some case-specific additional steps
• Next time…
   – Identify critical cases (and most conservative attorneys) and involve
     those case teams much earlier in the process to prevent delays

                                                                                 10
ESI – A Real World Example
                             Situation       Process       Resolution


• Global 500 company with over 60K legacy media
  items in one division
• Mostly backup tapes
   – Varying tape types and backup mechanisms (including NDMP)
• Media assumed to contain emails, user files,
  application data and other unknown content
• Little to no inventory information available for a large
  subset of the media items
• Desire to dispose of this information to reduce legal
  risk and storage costs



                                                                        11
ESI – A Real World Example
                                  Situation         Process         Resolution


•   Identified team members
•   Researched as much information as possible regarding
    media items and legal holds
•   Established sampling hypothesis
    – Materials on backup media were largely duplicative because legal hold
      custodians were preserving materials in active storage
•   Developed sampling strategy
    – Selected less than 50 (out of over 60K) media items to sample, targeting
      different date ranges and content (both email and file share backups)
•   Restored, indexed and then filtered data based on legal
    hold keywords
•   Reviewed for “responsiveness” and selected statistically
    valid set of emails and user files
•   Worked with custodians (and IT for former employees) to
    validate hypothesis
                                                                                 12
ESI – A Real World Example
                               Situation        Process       Resolution


• Recommended reasonable and legally defensible
  disposition of media items
• Proceeded with destruction/recycling of approximately
  80% of legacy media items
• Continued hold on the remaining media items
• Other significant highlights:
   – Process from kick-off to recommendations took about 8 months —
     several months longer than originally planned
   – Had to be flexible and adjust plan as issues were encountered
   – End result was well-received within Legal and by IT
   – Considering different approach on subsequent projects to minimize
     vendor costs


                                                                           13
Other Real World Examples




Examples?



                                  14
Additional Resources

• www.redgravellp.com:
  – Webcasts: “What do you want your legacy to be?”
  – Link: Sedona Commentary on Inactive Information
  – Podcast Links:
     • Dealing with Legacy Data – What to do About ESI Messes Today
     • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools


• Organizations:




                                                                                  15

Weitere ähnliche Inhalte

Was ist angesagt?

Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Rob Daley
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210
Jeph Pedrigal
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
Accenture
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
Patricia M Watson
 

Was ist angesagt? (20)

State Agency Basic Training
State Agency Basic TrainingState Agency Basic Training
State Agency Basic Training
 
Lecture 01 Data Mining
Lecture 01 Data MiningLecture 01 Data Mining
Lecture 01 Data Mining
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Electronic Records Training
Electronic Records TrainingElectronic Records Training
Electronic Records Training
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science
 
Data-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksData-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation Works
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210
 
Needs for Data Management & Citation Throughout the Information Lifecycle
Needs for Data Management & Citation Throughout  the Information LifecycleNeeds for Data Management & Citation Throughout  the Information Lifecycle
Needs for Data Management & Citation Throughout the Information Lifecycle
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the Pond
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & Governance
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 

Ähnlich wie Practical Legacy Data Remediation - Redgrave LLP

644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 

Ähnlich wie Practical Legacy Data Remediation - Redgrave LLP (20)

BAS 250 Lecture 1
BAS 250 Lecture 1BAS 250 Lecture 1
BAS 250 Lecture 1
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
DBMS
DBMSDBMS
DBMS
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data management
 
Introduction to data management
Introduction to data managementIntroduction to data management
Introduction to data management
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data Management
 
20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Data cycle health
Data cycle healthData cycle health
Data cycle health
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Graham Pryor
Graham PryorGraham Pryor
Graham Pryor
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management Plan
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate Researchers
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data Management
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Practical Legacy Data Remediation - Redgrave LLP

  • 1. Legacy Data Remediation: A Practical Approach Presented to the Association of Litigation Support Professionals Wednesday, March 30, 2011
  • 2. Today’s Panel Andy Cosgrove Partner, Redgrave LLP acosgrove@redgravellp.com Christian Rummelhoff Senior Analyst, Redgrave LLP crummelhoff@redgravellp.com Diana Fasching Senior Analyst, Redgrave LLP dfasching@redgravellp.com 2
  • 3. Presentation Goals • Gain legal and technical perspectives into a legacy data remediation project • Identify unique issues associated with the remediation of paper and electronic legacy data • Introduce ways to manage costs and limit burdens on everyday business operations 3
  • 4. Top 5 Reasons to Take Notice TOP #5) Litigation Costs #4) Litigation Risks; Why Keep Tomorrow’s Smoking Gun? #3) Reputation Risks; The WikiLeaks Effect #2) State & Federal Privacy Regulations #1) Retention Costs; The Box Burden 4
  • 5. Re-Defining Legacy Data Paper: Electronic: • Paper files, Photographs, • Old Backup Tapes, Backups Marketing Materials, and Other Made Prior to Data Migration Hardcopy Documents • Orphaned ESI (e.g. • Materials Stored On and/or departmental file shares) Offsite (e.g. Iron Mountain) • Inactive/Decommissioned • Documents in the Possession Servers of Third Parties • Retained Collections of Hard Drives, CDs or other Media • Data in the Possession of Third parties 5
  • 6. A Process for Addressing Legacy Data Iterative High-Level Risk-Focused Identify Disposition Understand Data Prepare Information Constraints Store(s) for Comparison - Retention Obligations - Origins - Preservation Matrix and - Statutory, Regulatory, - Date Ranges Materials Index Common Law Requirements - Formats - Similar Measures Allow - Contractual Requirements - Content Direct Comparison - Legal Hold Obligations - Custodian Disposition of Data Apply Risk Assessment (Reasonable Investigation) - Is Info Likely Relevant? - Is Info Likely Unique? - Duty to Preserve/Maintain? 6
  • 7. Remediation Framework/Considerations • 3 Key Considerations: Iterative, High Level, Risk Focused • General Tips – Work From Available Information; Infer Where Reasonable – Identify Best Value Approaches to Additional Investigation – Document Each Step • Identify Deletion/Destruction Constraints – Identify/Clarify Constraints at Issue Using Measurable Descriptors • Understand Data Stores – Origins, Date Ranges, Formats, Content, Custodian – Key Differences in Population – Breakdown Material into Groups – Additional Investigation: Sampling, Interviews, Database Mining • Prepare Information for Comparison – Constrains and Materials - Use Same/Similar Descriptors • Apply Risk Assessment to Identify Disposable Information 7
  • 8. Paper – A Real World Example Situation Process Resolution • Fortune 250 company with over 50K boxes of hard copy paper records eligible for disposition under the record schedule • Desire to dispose of material not subject to legal hold • Significant information available about the material in the boxes; less information available on open legal holds • Cost of assessment needed to be proportional to the cost of storing the material 8
  • 9. Paper – A Real World Example Situation Process Resolution • Validated information about the materials – Sampled boxes to confirm accuracy of indices – QC missing and suspect information (e.g., dates) • Gathered information regarding legal holds – Reviewed all open holds and used available matter reporting capabilities – Follow-up • Created “Preservation Matrix” – Consolidated holds into manageable number of categories – Each category had as broad a scope as the sum of the component holds – Primary considerations: Record Code, Date Range; Also Geography, Department, – Obtained case-team sign-off on hold scope assumptions – High quality of indices meant no need for equivalent categorization of material • Iterative, Risk-Based Assessment 9
  • 10. Paper – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of specific material – One third cleared at the first iteration (Record Code) – Another third cleared at the Record Code by date iteration – Final third held by a handful of cases requiring case-specific additional follow-up (collection, case team identification of relevant materials) • Other significant highlights: – Process from took longer than originally planned –the evolving hold environment (as cases open/close) complicated analysis – Outside counsel required some case-specific additional steps • Next time… – Identify critical cases (and most conservative attorneys) and involve those case teams much earlier in the process to prevent delays 10
  • 11. ESI – A Real World Example Situation Process Resolution • Global 500 company with over 60K legacy media items in one division • Mostly backup tapes – Varying tape types and backup mechanisms (including NDMP) • Media assumed to contain emails, user files, application data and other unknown content • Little to no inventory information available for a large subset of the media items • Desire to dispose of this information to reduce legal risk and storage costs 11
  • 12. ESI – A Real World Example Situation Process Resolution • Identified team members • Researched as much information as possible regarding media items and legal holds • Established sampling hypothesis – Materials on backup media were largely duplicative because legal hold custodians were preserving materials in active storage • Developed sampling strategy – Selected less than 50 (out of over 60K) media items to sample, targeting different date ranges and content (both email and file share backups) • Restored, indexed and then filtered data based on legal hold keywords • Reviewed for “responsiveness” and selected statistically valid set of emails and user files • Worked with custodians (and IT for former employees) to validate hypothesis 12
  • 13. ESI – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of media items • Proceeded with destruction/recycling of approximately 80% of legacy media items • Continued hold on the remaining media items • Other significant highlights: – Process from kick-off to recommendations took about 8 months — several months longer than originally planned – Had to be flexible and adjust plan as issues were encountered – End result was well-received within Legal and by IT – Considering different approach on subsequent projects to minimize vendor costs 13
  • 14. Other Real World Examples Examples? 14
  • 15. Additional Resources • www.redgravellp.com: – Webcasts: “What do you want your legacy to be?” – Link: Sedona Commentary on Inactive Information – Podcast Links: • Dealing with Legacy Data – What to do About ESI Messes Today • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools • Organizations: 15