SlideShare a Scribd company logo
1 of 28
Work Smarter, Not Harder
with Portfolio Management
John Winkler, Account Executive, Kroll Ontrack
David J. Kearney, Director Cohen & Grigsby PC
March 12, 2014
ACEDS Membership Benefits
Training, Resources and Networking for the
E-Discovery Community
Join Today! aceds.org/join
or Call ACEDS Member Services 786-517-2701
Exclusive News and Analysis
Weekly Web Seminars
Podcasts
On-Demand Training
Networking
Resources
Jobs Board & Career Center
bits + bytes Newsletter
CEDS Certification
And Much More!
“ACEDS provides an excellent, much needed forum… to train, network and stay
current on critical information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
13 panels, 35 speakers, 14 networking events
Federal Rules amendments, judicial guidance, legal holds & more!
Presenters include:
Federal judges including Hon. David Waxse, Rules Advisory
Committee member, NFL Special Master, corporate attorneys
Register or learn more at EDiscoveryConference.com
Use code ―PORTFOLIO20‖ to save 20%
4
John Winkler
 Account Executive at Kroll Ontrack
 Partners with law firm clients to
advise on ediscovery best practices
 Over 18 years experience in the legal
technology field
 Frequent author and speaker on
ediscovery topics and best practices
jwinkler@krollontrack.com
(216) 570-3905
5
David J. Kearney
 Director of Technology Services at
Cohen & Grigsby, P.C.
 Established ediscovery and project
management professional
 Multiple industry certifications, such
as PMP, CEDS
 Authored numerous articles related
to electronic discovery
 Frequent speaker and instructor on
various ediscovery topics
dkearney@cohenlaw.com
(412) 297-4651
6
Overview
 The False Facade: The Case-by-Case Approach to
Project Management
 Cutting the Clutter : The Portfolio Management
Approach
 Work Smarter, Not Harder: Important Considerations
for Making the Switch
 Conclusion
The Case-by-Case Approach to Project Management
The False Facade
7
8
The “Case-by-Case” Approach
Source: Kroll Ontrack Advisory Board Survey (2013)
 Organizations waste
time and money
reinventing the
ediscovery process
with each case!
9
The “Case-by-Case” Perception
 “Each case is unique”
» Organizations create hard
boundaries regarding the
process for each project
» Data is collected, analyzed,
reviewed, and produced
entirely disconnected from
other projects within the
organization!
 This approach is chaotic
and highly inefficient!
» Piecemeal adoption
Project 3
Project 1 Project 2
» The same data and/or custodians collected numerous times!
The Portfolio Management Approach
Cutting the Clutter
10
11
The Reality
Source: eDJ Group, Reduce, Reuse, Recycle: Effective Multi-matter Portfolio
Management (2013)
Not Often (<25%)
Often (25-50%)
Very Often (>50%)
20%
33.3%
46.7%
 How often do you have cases with overlapping
custodians, collections or productions?
12
The Reality | Overlap Among Matters
 Each case is unique, but...
» Fewer hard boundaries
between matters
» Significant overlap with regard
to
documents, custodians, and
tools
 By acknowledging this
overlap, an organization
can:
» Minimize data transfers
» Decrease total data stored
Project 1 Project 2
Project 3
» Consolidate location of ediscovery data and work product
The “Ties that Bind” Your Ediscovery
Duplicative
Documents
Overlapping Tools
Repeat
Custodians
 How the portfolio approach maximizes efficiencies for
a corporation:
Organizations can
avoid re-identifying,
re-collecting, or re-
processing data by
isolating documents
potentially subject to
repeat litigation in a
post-processing
universal database!
Store ESI for
repeat custodians
in a suspended
state of storage to
limit re-collecting
Avoid additional data
transfers, processing,
etc. by leveraging the
same tools across the
EDRM
The “Ties that Bind” Your Ediscovery
 How the portfolio approach maximizes efficiencies for
a law firm, where:
Project 1
Project 2
Project 3
Project 1 Project 2
Project 3
» Minimizes the number of redundant project management steps—Do
not have to ―reinvent the wheel‖ with each case!
» Lowers the cost of projects with corporate of client data by folding
the management processes into the portfolio
Managing
each project...
…Managing the portfolio
Transitions
to
15
The Portfolio Approach
For one case… …or 100 cases
Leverage the same processes, systems
and/or technologies
Goal
16
The Portfolio Approach
Leverage the same processes, systems
and technologies
Goal
Collaboration
Tracking
ConservationKey
Components
Important Considerations for Making the Switch
Work Smarter, Not Harder
17
18
Considerations for Implementation
 A fundamental shift in the way organizations conduct
ediscovery that requires forethought
» Identifying opportunities to collaborate and conserve resources
» Creating sound processes and employing effective technologies to
maximize efficiencies
 Additional questions regarding solutions:
» Capacity to handle current data needs
» Capacity to handle future data needs
» Cost of implementation
» Security of solution
» Repeatability of solution
1
2
3
4
5
19
Do Existing Tools Meet Today’s Needs?
 Big data is the biggest challenge
 Red flags suggesting under-performing solutions:
» Hosting a massive amount of email or loose data not currently
subject to any sort of information management
» Employed outdated tools like basic keyword search as the sole
means of data analysis
» Not having a process or means to bring on more labor or better
technology when large cases arise
1
64 percent of organizations have invested or plan to invest in
big data systems, but only eight percent of those planning to
implement a solution have actually taken steps to implement it.
-Gil Allouche, What the Gartner Big Data 2013 Report Means for the Industry (Nov. 2, 2013)
20
Do Tools Meet Tomorrow’s Needs?
 Applying Predictive coding to analyze your data
 Per-project cost and comfortability are two barriers to
widespread use, but that change is already underway
» Some vendors already adopting new pricing plans for PC to shift
from per-project basis to a monthly fee
» Case law has already paved the way for counsel to use this tool, and
we may be on the cusp of greater adoption
 Ultimately, circles back to basic risk assessment:
» What is the likelihood that my organization will want to use
predictive coding during the lifetime of this litigation support
tool?
2
21
What Will it Cost my Organization?
 What is the true cost of on-premise software?
» Maintaining a server (power, security, maintenance)
» The cost to store ESI being processes or analyzed
» Costs for personnel capable of running the software
 Is it compatible with other applications in my
organization’s case management workflow?
» Might result in additional consulting, training, processing costs…
 Additional consideration: viability of Software as a
Service (SaaS) solutions
» Some estimate that the initial cost of on-premise hardware and
software may only represent 25 percent of the total long-term cost
3
22
Is the Solution Secure?
 Presumably, a cloud-based solution is best suited for
the portfolio management approach
» Allows team to use a consistent, repeatable process where you can
utilize data from multiple cases
4
The ―ideal scenario‖ should allow legal professionals to access
documents in ―a centralized legal repository that supports multi-matter,
multi-party ediscovery.‖
-Daniel Lim, 5 Tips for Using the Cloud to Conduct E-Discovery (July 25, 2012)
 Vetting the security of existing and potential
solutions is paramount
» With a bevy of important security considerations…
23
Cloud Security Considerations
 Private versus public cloud environment
» Private clouds often considered more secure because organizations
have more control over preservation and collection
» May not know where data geographically resides in a public cloud
– Potentially raises international compliance challenges
 Planning for disaster
» Make sure data is encrypted when it is in transit
» Vet certifications and physical security of the provider’s data center
 Portfolio management: ensure provider only stores one
instance of a document
» Minimizes auditing and security associated with hosting stages
4
24
Is Your Solution Repeatable?
 Existing approach: create process as projects arise
» With each new project, decisions are made about whether existing
processes and tools are good enough for everything from collection
through production—or whether additional tools are necessary
» Highly chaotic: overlapping processes and interoperability issues
 Possible solution: contracting for all the tools you need
for your cases in a given time period
» Ensures seamless integration amongst tools for different EDRM
phases
» Many vendors now offer solutions based on monthly hosting fees to
minimize overall cost to an organization
5
25
Is Your Solution Repeatable?
 Key components: a post-processing centralized
database for analysis and review with robust inter-
project reporting
» Post-processing centralized database: storing every case
document on a centralized platform avoids duplicative collection,
identification and processing for repeat or consecutive litigation
» Analysis and review: all document groupings and decisions made
can be preserved and utilized for additional cases, if applicable
» Robust inter-project reporting: the portfolio management tool
should track critical case information like:
– The number of custodians per case
– Number of documents escalated to review
– How much time and money were spent on each process
5
The Portfolio Management Approach
Conclusion
26
27
Benefits of The Portfolio Approach
 Increased efficiency
» Less time and effort spent of duplicative steps
» Focus on case strategy and new issues
 Budgeting and cost savings
» Budgeting more predictable via repeatable processes
 Transparency
» Insight into entire edisocvery portfolio
» Identify trends and opportunities to improve processes
March 2014 aceds portfolio c&g kroll webinar

More Related Content

What's hot

What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3IANS
 
Maximum Impact with Interactive Video
Maximum Impact with Interactive VideoMaximum Impact with Interactive Video
Maximum Impact with Interactive VideoAllison Selby
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarConcept Searching, Inc
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideSatchit Dokras
 
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...Becky Ward
 
Paper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business NeedsPaper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business NeedsAIIM International
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
Data-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality EngineeringData-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality EngineeringDATAVERSITY
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Infoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case StudyInfoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case StudyPlusNarrative
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
 
Big data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.pptBig data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.pptAravindharamanan S
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big DataIBM Analytics
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 

What's hot (20)

What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
Maximum Impact with Interactive Video
Maximum Impact with Interactive VideoMaximum Impact with Interactive Video
Maximum Impact with Interactive Video
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
 
Paper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business NeedsPaper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business Needs
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Data-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality EngineeringData-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality Engineering
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Infoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case StudyInfoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case Study
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Big data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.pptBig data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.ppt
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 

Viewers also liked

Welcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMIWelcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMIDavid Kearney
 
Effectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn PresenceEffectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn PresenceDavid Kearney
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
OLP - Options for Outsourcing
OLP - Options for OutsourcingOLP - Options for Outsourcing
OLP - Options for OutsourcingDavid Kearney
 
CG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 finalCG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 finalDavid Kearney
 
AHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMRAHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMRDavid Kearney
 

Viewers also liked (7)

Lpm awareness
Lpm awarenessLpm awareness
Lpm awareness
 
Welcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMIWelcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMI
 
Effectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn PresenceEffectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn Presence
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
OLP - Options for Outsourcing
OLP - Options for OutsourcingOLP - Options for Outsourcing
OLP - Options for Outsourcing
 
CG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 finalCG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 final
 
AHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMRAHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMR
 

Similar to March 2014 aceds portfolio c&g kroll webinar

Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planningVanderbilt University
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overviewjkvr
 
The advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projectsThe advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projectselladeon
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate BrochureAlan Brooks
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management toolssarahbrown1
 
How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?Charles Mok
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Mills Davis
 
MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review Michelle Purnama
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.Luis Santos
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolutionitnewsafrica
 
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...Denodo
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfHome
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009SBHPatrick
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierJim Merrifield, IGP, CIP
 

Similar to March 2014 aceds portfolio c&g kroll webinar (20)

ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
 
Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planning
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overview
 
The advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projectsThe advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projects
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management tools
 
How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
Presentation kroll
Presentation krollPresentation kroll
Presentation kroll
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011
 
MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
 

More from David Kearney

Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?David Kearney
 
Agile cert37pdu hours
Agile cert37pdu hoursAgile cert37pdu hours
Agile cert37pdu hoursDavid Kearney
 
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)David Kearney
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery David Kearney
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangleDavid Kearney
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
E discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education optionsE discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education optionsDavid Kearney
 
Project Management In Legal One Of The Missing Pieces
Project Management In Legal   One Of The Missing PiecesProject Management In Legal   One Of The Missing Pieces
Project Management In Legal One Of The Missing PiecesDavid Kearney
 
Litigation Support Presentation Ppt
Litigation Support Presentation PptLitigation Support Presentation Ppt
Litigation Support Presentation PptDavid Kearney
 

More from David Kearney (15)

Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?
 
COA
COACOA
COA
 
TMI_CC_Award
TMI_CC_AwardTMI_CC_Award
TMI_CC_Award
 
Agile cert37pdu hours
Agile cert37pdu hoursAgile cert37pdu hours
Agile cert37pdu hours
 
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
 
six-sigma
six-sigmasix-sigma
six-sigma
 
LSSeco_certificate
LSSeco_certificateLSSeco_certificate
LSSeco_certificate
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
E discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education optionsE discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education options
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
 
Project Management In Legal One Of The Missing Pieces
Project Management In Legal   One Of The Missing PiecesProject Management In Legal   One Of The Missing Pieces
Project Management In Legal One Of The Missing Pieces
 
Litigation Support Presentation Ppt
Litigation Support Presentation PptLitigation Support Presentation Ppt
Litigation Support Presentation Ppt
 
Litigation Support
Litigation SupportLitigation Support
Litigation Support
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

March 2014 aceds portfolio c&g kroll webinar

  • 1. Work Smarter, Not Harder with Portfolio Management John Winkler, Account Executive, Kroll Ontrack David J. Kearney, Director Cohen & Grigsby PC March 12, 2014
  • 2. ACEDS Membership Benefits Training, Resources and Networking for the E-Discovery Community Join Today! aceds.org/join or Call ACEDS Member Services 786-517-2701 Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More! “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3. 13 panels, 35 speakers, 14 networking events Federal Rules amendments, judicial guidance, legal holds & more! Presenters include: Federal judges including Hon. David Waxse, Rules Advisory Committee member, NFL Special Master, corporate attorneys Register or learn more at EDiscoveryConference.com Use code ―PORTFOLIO20‖ to save 20%
  • 4. 4 John Winkler  Account Executive at Kroll Ontrack  Partners with law firm clients to advise on ediscovery best practices  Over 18 years experience in the legal technology field  Frequent author and speaker on ediscovery topics and best practices jwinkler@krollontrack.com (216) 570-3905
  • 5. 5 David J. Kearney  Director of Technology Services at Cohen & Grigsby, P.C.  Established ediscovery and project management professional  Multiple industry certifications, such as PMP, CEDS  Authored numerous articles related to electronic discovery  Frequent speaker and instructor on various ediscovery topics dkearney@cohenlaw.com (412) 297-4651
  • 6. 6 Overview  The False Facade: The Case-by-Case Approach to Project Management  Cutting the Clutter : The Portfolio Management Approach  Work Smarter, Not Harder: Important Considerations for Making the Switch  Conclusion
  • 7. The Case-by-Case Approach to Project Management The False Facade 7
  • 8. 8 The “Case-by-Case” Approach Source: Kroll Ontrack Advisory Board Survey (2013)  Organizations waste time and money reinventing the ediscovery process with each case!
  • 9. 9 The “Case-by-Case” Perception  “Each case is unique” » Organizations create hard boundaries regarding the process for each project » Data is collected, analyzed, reviewed, and produced entirely disconnected from other projects within the organization!  This approach is chaotic and highly inefficient! » Piecemeal adoption Project 3 Project 1 Project 2 » The same data and/or custodians collected numerous times!
  • 10. The Portfolio Management Approach Cutting the Clutter 10
  • 11. 11 The Reality Source: eDJ Group, Reduce, Reuse, Recycle: Effective Multi-matter Portfolio Management (2013) Not Often (<25%) Often (25-50%) Very Often (>50%) 20% 33.3% 46.7%  How often do you have cases with overlapping custodians, collections or productions?
  • 12. 12 The Reality | Overlap Among Matters  Each case is unique, but... » Fewer hard boundaries between matters » Significant overlap with regard to documents, custodians, and tools  By acknowledging this overlap, an organization can: » Minimize data transfers » Decrease total data stored Project 1 Project 2 Project 3 » Consolidate location of ediscovery data and work product
  • 13. The “Ties that Bind” Your Ediscovery Duplicative Documents Overlapping Tools Repeat Custodians  How the portfolio approach maximizes efficiencies for a corporation: Organizations can avoid re-identifying, re-collecting, or re- processing data by isolating documents potentially subject to repeat litigation in a post-processing universal database! Store ESI for repeat custodians in a suspended state of storage to limit re-collecting Avoid additional data transfers, processing, etc. by leveraging the same tools across the EDRM
  • 14. The “Ties that Bind” Your Ediscovery  How the portfolio approach maximizes efficiencies for a law firm, where: Project 1 Project 2 Project 3 Project 1 Project 2 Project 3 » Minimizes the number of redundant project management steps—Do not have to ―reinvent the wheel‖ with each case! » Lowers the cost of projects with corporate of client data by folding the management processes into the portfolio Managing each project... …Managing the portfolio Transitions to
  • 15. 15 The Portfolio Approach For one case… …or 100 cases Leverage the same processes, systems and/or technologies Goal
  • 16. 16 The Portfolio Approach Leverage the same processes, systems and technologies Goal Collaboration Tracking ConservationKey Components
  • 17. Important Considerations for Making the Switch Work Smarter, Not Harder 17
  • 18. 18 Considerations for Implementation  A fundamental shift in the way organizations conduct ediscovery that requires forethought » Identifying opportunities to collaborate and conserve resources » Creating sound processes and employing effective technologies to maximize efficiencies  Additional questions regarding solutions: » Capacity to handle current data needs » Capacity to handle future data needs » Cost of implementation » Security of solution » Repeatability of solution 1 2 3 4 5
  • 19. 19 Do Existing Tools Meet Today’s Needs?  Big data is the biggest challenge  Red flags suggesting under-performing solutions: » Hosting a massive amount of email or loose data not currently subject to any sort of information management » Employed outdated tools like basic keyword search as the sole means of data analysis » Not having a process or means to bring on more labor or better technology when large cases arise 1 64 percent of organizations have invested or plan to invest in big data systems, but only eight percent of those planning to implement a solution have actually taken steps to implement it. -Gil Allouche, What the Gartner Big Data 2013 Report Means for the Industry (Nov. 2, 2013)
  • 20. 20 Do Tools Meet Tomorrow’s Needs?  Applying Predictive coding to analyze your data  Per-project cost and comfortability are two barriers to widespread use, but that change is already underway » Some vendors already adopting new pricing plans for PC to shift from per-project basis to a monthly fee » Case law has already paved the way for counsel to use this tool, and we may be on the cusp of greater adoption  Ultimately, circles back to basic risk assessment: » What is the likelihood that my organization will want to use predictive coding during the lifetime of this litigation support tool? 2
  • 21. 21 What Will it Cost my Organization?  What is the true cost of on-premise software? » Maintaining a server (power, security, maintenance) » The cost to store ESI being processes or analyzed » Costs for personnel capable of running the software  Is it compatible with other applications in my organization’s case management workflow? » Might result in additional consulting, training, processing costs…  Additional consideration: viability of Software as a Service (SaaS) solutions » Some estimate that the initial cost of on-premise hardware and software may only represent 25 percent of the total long-term cost 3
  • 22. 22 Is the Solution Secure?  Presumably, a cloud-based solution is best suited for the portfolio management approach » Allows team to use a consistent, repeatable process where you can utilize data from multiple cases 4 The ―ideal scenario‖ should allow legal professionals to access documents in ―a centralized legal repository that supports multi-matter, multi-party ediscovery.‖ -Daniel Lim, 5 Tips for Using the Cloud to Conduct E-Discovery (July 25, 2012)  Vetting the security of existing and potential solutions is paramount » With a bevy of important security considerations…
  • 23. 23 Cloud Security Considerations  Private versus public cloud environment » Private clouds often considered more secure because organizations have more control over preservation and collection » May not know where data geographically resides in a public cloud – Potentially raises international compliance challenges  Planning for disaster » Make sure data is encrypted when it is in transit » Vet certifications and physical security of the provider’s data center  Portfolio management: ensure provider only stores one instance of a document » Minimizes auditing and security associated with hosting stages 4
  • 24. 24 Is Your Solution Repeatable?  Existing approach: create process as projects arise » With each new project, decisions are made about whether existing processes and tools are good enough for everything from collection through production—or whether additional tools are necessary » Highly chaotic: overlapping processes and interoperability issues  Possible solution: contracting for all the tools you need for your cases in a given time period » Ensures seamless integration amongst tools for different EDRM phases » Many vendors now offer solutions based on monthly hosting fees to minimize overall cost to an organization 5
  • 25. 25 Is Your Solution Repeatable?  Key components: a post-processing centralized database for analysis and review with robust inter- project reporting » Post-processing centralized database: storing every case document on a centralized platform avoids duplicative collection, identification and processing for repeat or consecutive litigation » Analysis and review: all document groupings and decisions made can be preserved and utilized for additional cases, if applicable » Robust inter-project reporting: the portfolio management tool should track critical case information like: – The number of custodians per case – Number of documents escalated to review – How much time and money were spent on each process 5
  • 26. The Portfolio Management Approach Conclusion 26
  • 27. 27 Benefits of The Portfolio Approach  Increased efficiency » Less time and effort spent of duplicative steps » Focus on case strategy and new issues  Budgeting and cost savings » Budgeting more predictable via repeatable processes  Transparency » Insight into entire edisocvery portfolio » Identify trends and opportunities to improve processes

Editor's Notes

  1. For those of you who aren’t familiar with us, We are a members-only association that provides training, resources, and networking to the e-discovery community. We also offer the Certified E-Discovery Specialist credential, which is held by hundreds of professional across the Americas, Europe and Asia. You can join today and start receiving a number of benefits exclusive to our members, including news content, on-demand web seminars, our bits+bytes newsletter and discounts on certification and our annual e-discovery conference in April.
  2. The 2014 ACEDS Conference will be held at the beautiful Westin Diplomat in Hollywood, Florida from April 27 to 29. The conference features 14 panels, 35 top speakers and beachside networking events. Among the presenters is Steven Levy, the former head of legal operations at Microsoft and a pioneer of legal project management, and Judge David Waxse, who has authored several groundbreaking e-discovery decisions. Two federal judges from the US Court in the Southern District of Florida will also speak, along with the former General Counsel at BASF, top litigators, the E-Discovery Director at UnitedHealth Group and many more more. You can register or get more information at eDiscoveryConference.com. And, as a thank you for being here, if you enter the code Portfolio20, you will receive 20% off. Again that’s Portfolio20.