SlideShare a Scribd company logo
1 of 20
Ethics, Efficiency, and Economics
Technology in the Practice of Law
An introductory overview of how to consider technology in the practice of law.
Considering the use of technology.



• What are the ethical expectations for technology use?


• How does one organize/equip for technology efficiency?


• How can one minimize the economic costs of technology?




                    Ethics | Efficiency | Economics


11/11/2008                                                 2
Ethical Expectations


                        In all professional functions
                             a lawyer should be

                                competent,
                                prompt and
                                 diligent*.


             *ABA Model Rules of Professional Conduct, Preamble 1(4), (2004)



11/11/2008                                                                     3
Ethical Expectations


A lawyer shall provide competent representation to a client*.



  Competent representation requires the legal knowledge, skill,
      thoroughness and preparation reasonably necessary*.




                *ABA Model Rules of Professional Conduct, Rule 1.1, (2004)



11/11/2008                                                                   4
Ethical Expectations



               “Reasonable” or “reasonably”
       when used in relation to conduct by a lawyer denotes the
       conduct of a reasonably prudent and competent lawyer*.




                *ABA Model Rules of Professional Conduct, Rule 1.0(h), (2004)



11/11/2008                                                                      5
Ethical Expectations

What is reasonable in relation to a lawyer’s understanding of technology?



• Understanding of technology requirements.
  Create (ESI) | Connect | Communicate | Collaborate | Conduct (Management)


• Understanding of technology related requests.
   eMail | eFiling | Meet and Confer | Collection | Production | Storage

• Ability to articulate technology and requirements.
  Legal Team| Client | Opposing Counsel | Jury | Judge




11/11/2008                                                                    6
Efficient Technology
     Five critical areas in relation to a lawyer’s understanding of technology:



• Creation (ESI*).
• Connectivity.
• Communication.
• Collaboration.
• Conduct (Management).


             *ESI: Electronically Stored Information = all information on computers. 11/06, Third Branch



11/11/2008                                                                                                 7
Legal Technology Reference Model
         High




                                                                                            Conduct
Internal Support




                                                                                            (Management)
                                                                            Collaboration

                                                          Communication


                                           Connectivity



                                Creation



          Low                                                                                              High
                                                    Technology Capability
                   11/11/2008                                                                              8
Efficient Technology

    Technology enables the creation of Electronically Stored Information.

•Data Structures.
Structured | Unstructured
•Data Formats.
Still Image | Moving Image | Sound |Textual |Web Archive | Generic
• Data Volume.
Uncompressed | Compressed
•Data Security.
Unencrypted | Encrypted
•Data States.
Active | Static | Residual



11/11/2008                                                                  9
Economic Technology

    Technology enables the creation of Electronically Stored Information.

                                 Hardware
                                 •Personal Computer
•Data Structures.                •Monitor
                                 •Network Interface Capability (Wire and/or Wireless)
•Data Formats.                   •Electrical Protection System
                                 •Storage Backup
• Data Volume.
                                 •Multifunction Printer/Scanner/Fax
•Data Security.
                                 Software
•Data States.                    •Operating System
                                 •Productivity Suite
                                 •Email Enablement Application
                                 •Security Suite (AntiVirus/Spyware)
                                 •Media Playing Application
                                 •HTML Viewing Application
                                 •PDF Creation/Viewer Application
                                 •Compression/Decompression Application

11/11/2008                                                                              10
Efficient Technology

             Connectivity of technology accelerates efficiency.

•Personal Area Networks.
•Local Area Networks
•Campus Area Networks.
•Metro Area Networks.
•Wide Area Networks.
•InterNetworks.
•Data Storage Networks.




11/11/2008                                                        11
Economic Technology

             Connectivity of technology accelerates efficiency.
                                           Hardware
•Personal Area Networks.
                                           •Server
•Local Area Networks                       •Electrical Protection System
                                           •Network Switch / Router (Wire and/or Wireless)
•Campus Area Networks.                     •Storage Backup

•Metro Area Networks.                      Software
•Wide Area Networks.                       •Server Operating System
                                           •Server Security Suite (AntiVirus/Spyware)
•InterNetworks.                            •Firewall*

•Data Storage Networks.                    Service
                                           •Internet Connectivity




                    *Firewall can be hardware and/or software enabled.

11/11/2008                                                                               12
Efficient Technology

             Communication is the benefit of Connectivity.

•eMail.
•Instant Messaging.
•Podcasts/Videocasts.
•SMS/Text Messages.
•RSS Feeds.
•Voice Mail.
•Webinars.
•Websites.


                            *Integrated or External.
11/11/2008                                                           13
Economic Technology

             Communication is the benefit of Connectivity.
                                       Hardware*
•eMail.                                •Video Camera
•Instant Messaging.                    •Microphone

                                       Software
•Podcasts/Videocasts.
                                       •Server Email Enablement Application
•SMS/Text Messages.                    •Server File Sharing Application
                                       •Instant Messaging Application
•RSS Feeds.                            •RSS Feed Reader
•Voice Mail.
                                       Service
•Webinars.                             •Instant Messaging Service
                                       •SMS/Text Messaging Service
•Websites.                             •Voice Mail Service
                                       •Webinar Service
                                       •Website Host

                            *Integrated or External.
11/11/2008                                                                    14
Efficient Technology

             Collaboration is the benefit of connected communication.

•Blogs.
•Conferencing Applications.
•Message Boards.
•Wikis.




                   *Can be delivered via server software and/or online service provider.
11/11/2008                                                                                 15
Economic Technology

             Collaboration is the benefit of connected communication.
                                                          Hardware
•Blogs.                                                   •Video Camera
                                                          •Microphone
•Conferencing Applications.
                                                          Software
•Message Boards.
                                                          •Blog Enablement Application*
•Wikis.                                                   •Online Conferencing Application*
                                                          •Message Board Enablement Application.*
                                                          •Wiki Enablement Application*

                                                          Service
                                                          •Blog Service*
                                                          •Online Conferencing Service*
                                                          •Message Board Service.*
                                                          •Wiki Service*


                   *Can be delivered via server software and/or online service provider.
11/11/2008                                                                                          16
Efficient Technology

        Conduct (Management) of technology is reasonable.

• Billing and Accounting.
• Case Management.
• Document Management.
• Information Backup.




              *Can be delivered via server software and/or online service provider.
11/11/2008                                                                            17
Economic Technology

        Conduct (Management) of technology is reasonable.

                                                     Hardware
• Billing and Accounting.
                                                     •External Storage Capability
• Case Management.
                                                     Software
• Document Management.                               •Billing and Accounting Application*
                                                     •Case Management Application*
• Information Backup.                                •Document Management Application.*
                                                     •Automated Information Backup System

                                                     Service
                                                     •Billing and Accounting Application*
                                                     •Case Management Application*
                                                     •Document Management Application.*




              *Can be delivered via server software and/or online service provider.
11/11/2008                                                                                  18
Legal Technology Reprise




   Are you competent in leveraging technology in representing clients*?

     Is your knowledge, and skill, in relation to technology reasonable*?




                   *ABA Model Rules of Professional Conduct, Rule 1.1, (2004)



11/11/2008                                                                      19
Technology in the Practice of Law



As a general rule,
the most successful man in life
 is the man who has the best information.

Benjamin Disraeli




11/11/2008                                          20

More Related Content

What's hot

I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008pwcom.co.uk Ltd
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in RussiaAleksey Lukatskiy
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ECS UK
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security LandscapePeter Wood
 
Moving from Records to Engagement to Insight
Moving from Records to Engagement to InsightMoving from Records to Engagement to Insight
Moving from Records to Engagement to InsightJohn Mancini
 

What's hot (20)

I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in Russia
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Online DFS
Online DFSOnline DFS
Online DFS
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Corporate overview 2.0
Corporate overview 2.0Corporate overview 2.0
Corporate overview 2.0
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
 
Moving from Records to Engagement to Insight
Moving from Records to Engagement to InsightMoving from Records to Engagement to Insight
Moving from Records to Engagement to Insight
 

Similar to Complex Discovery Ethics Efficiency And Economics (Overview) 1108

Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documentslegalinfo
 
ETIS General Presentation
ETIS General PresentationETIS General Presentation
ETIS General Presentationskaaraas
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Cloudera, Inc.
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India
 
Network Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentationNetwork Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentationEmulex Corporation
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 
Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureEMC Forum India
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsIntel IoT
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide EthernetRockwell Automation
 
NIEM and Future SAR
NIEM and Future SARNIEM and Future SAR
NIEM and Future SARBizagi Inc
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryEmulex Corporation
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing StrategyJas Mann
 

Similar to Complex Discovery Ethics Efficiency And Economics (Overview) 1108 (20)

Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documents
 
ETIS General Presentation
ETIS General PresentationETIS General Presentation
ETIS General Presentation
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Network Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentationNetwork Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentation
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information Infrastructure
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
NIEM and Future SAR
NIEM and Future SARNIEM and Future SAR
NIEM and Future SAR
 
CeBIT-Preview Hamburg
CeBIT-Preview HamburgCeBIT-Preview Hamburg
CeBIT-Preview Hamburg
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
The Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoTThe Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoT
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing Strategy
 

More from Rob Robinson

Market Kinetics - Five eDiscovery Areas of Interest - 042922
Market Kinetics - Five eDiscovery Areas of Interest - 042922Market Kinetics - Five eDiscovery Areas of Interest - 042922
Market Kinetics - Five eDiscovery Areas of Interest - 042922Rob Robinson
 
Summer 2016 - eDiscovery Business Challenges
Summer 2016 - eDiscovery Business ChallengesSummer 2016 - eDiscovery Business Challenges
Summer 2016 - eDiscovery Business ChallengesRob Robinson
 
InfoGraphic: Six Ways to Enhance Investigations and eDiscovery
InfoGraphic: Six Ways to Enhance Investigations and eDiscoveryInfoGraphic: Six Ways to Enhance Investigations and eDiscovery
InfoGraphic: Six Ways to Enhance Investigations and eDiscoveryRob Robinson
 
eDiscovery Business Confidence Survey - Summer 2016 Results
eDiscovery Business Confidence Survey - Summer 2016 ResultseDiscovery Business Confidence Survey - Summer 2016 Results
eDiscovery Business Confidence Survey - Summer 2016 ResultsRob Robinson
 
eDiscovery Business Confidence Survey - Spring 2016 Results
eDiscovery Business Confidence Survey - Spring 2016 ResultseDiscovery Business Confidence Survey - Spring 2016 Results
eDiscovery Business Confidence Survey - Spring 2016 ResultsRob Robinson
 
eDiscovery Business Confidence Survey - Winter 2016 Results
eDiscovery Business Confidence Survey - Winter 2016 ResultseDiscovery Business Confidence Survey - Winter 2016 Results
eDiscovery Business Confidence Survey - Winter 2016 ResultsRob Robinson
 
Peck Parties and Predictive Coding Update - 100813
Peck Parties and Predictive Coding Update - 100813Peck Parties and Predictive Coding Update - 100813
Peck Parties and Predictive Coding Update - 100813Rob Robinson
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Rob Robinson
 
Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Rob Robinson
 
From Ethics to eDiscovery - with Tom O'Connor
From Ethics to eDiscovery - with Tom O'ConnorFrom Ethics to eDiscovery - with Tom O'Connor
From Ethics to eDiscovery - with Tom O'ConnorRob Robinson
 
The Recovery in E-Discovery"
The Recovery in E-Discovery"The Recovery in E-Discovery"
The Recovery in E-Discovery"Rob Robinson
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayRob Robinson
 
Review Of The Law Of Evidence South African Law Reform Commission
Review Of The Law Of Evidence   South African Law Reform CommissionReview Of The Law Of Evidence   South African Law Reform Commission
Review Of The Law Of Evidence South African Law Reform CommissionRob Robinson
 
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and OrderRob Robinson
 
Leveraging Social Media for High Impact Marketing
Leveraging Social Media for High Impact MarketingLeveraging Social Media for High Impact Marketing
Leveraging Social Media for High Impact MarketingRob Robinson
 
Considering New Principles Of Marketing Communications 103009
Considering New Principles Of Marketing Communications 103009Considering New Principles Of Marketing Communications 103009
Considering New Principles Of Marketing Communications 103009Rob Robinson
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMRob Robinson
 

More from Rob Robinson (20)

Market Kinetics - Five eDiscovery Areas of Interest - 042922
Market Kinetics - Five eDiscovery Areas of Interest - 042922Market Kinetics - Five eDiscovery Areas of Interest - 042922
Market Kinetics - Five eDiscovery Areas of Interest - 042922
 
Summer 2016 - eDiscovery Business Challenges
Summer 2016 - eDiscovery Business ChallengesSummer 2016 - eDiscovery Business Challenges
Summer 2016 - eDiscovery Business Challenges
 
InfoGraphic: Six Ways to Enhance Investigations and eDiscovery
InfoGraphic: Six Ways to Enhance Investigations and eDiscoveryInfoGraphic: Six Ways to Enhance Investigations and eDiscovery
InfoGraphic: Six Ways to Enhance Investigations and eDiscovery
 
eDiscovery Business Confidence Survey - Summer 2016 Results
eDiscovery Business Confidence Survey - Summer 2016 ResultseDiscovery Business Confidence Survey - Summer 2016 Results
eDiscovery Business Confidence Survey - Summer 2016 Results
 
eDiscovery Business Confidence Survey - Spring 2016 Results
eDiscovery Business Confidence Survey - Spring 2016 ResultseDiscovery Business Confidence Survey - Spring 2016 Results
eDiscovery Business Confidence Survey - Spring 2016 Results
 
eDiscovery Business Confidence Survey - Winter 2016 Results
eDiscovery Business Confidence Survey - Winter 2016 ResultseDiscovery Business Confidence Survey - Winter 2016 Results
eDiscovery Business Confidence Survey - Winter 2016 Results
 
Peck Parties and Predictive Coding Update - 100813
Peck Parties and Predictive Coding Update - 100813Peck Parties and Predictive Coding Update - 100813
Peck Parties and Predictive Coding Update - 100813
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014
 
Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013
 
From Ethics to eDiscovery - with Tom O'Connor
From Ethics to eDiscovery - with Tom O'ConnorFrom Ethics to eDiscovery - with Tom O'Connor
From Ethics to eDiscovery - with Tom O'Connor
 
The Recovery in E-Discovery"
The Recovery in E-Discovery"The Recovery in E-Discovery"
The Recovery in E-Discovery"
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Review Of The Law Of Evidence South African Law Reform Commission
Review Of The Law Of Evidence   South African Law Reform CommissionReview Of The Law Of Evidence   South African Law Reform Commission
Review Of The Law Of Evidence South African Law Reform Commission
 
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order
'Zubulake' Revisited: Six Years Later." The Pension Committee Opinion and Order
 
Leveraging Social Media for High Impact Marketing
Leveraging Social Media for High Impact MarketingLeveraging Social Media for High Impact Marketing
Leveraging Social Media for High Impact Marketing
 
Considering New Principles Of Marketing Communications 103009
Considering New Principles Of Marketing Communications 103009Considering New Principles Of Marketing Communications 103009
Considering New Principles Of Marketing Communications 103009
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRM
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Complex Discovery Ethics Efficiency And Economics (Overview) 1108

  • 1. Ethics, Efficiency, and Economics Technology in the Practice of Law An introductory overview of how to consider technology in the practice of law.
  • 2. Considering the use of technology. • What are the ethical expectations for technology use? • How does one organize/equip for technology efficiency? • How can one minimize the economic costs of technology? Ethics | Efficiency | Economics 11/11/2008 2
  • 3. Ethical Expectations In all professional functions a lawyer should be competent, prompt and diligent*. *ABA Model Rules of Professional Conduct, Preamble 1(4), (2004) 11/11/2008 3
  • 4. Ethical Expectations A lawyer shall provide competent representation to a client*. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary*. *ABA Model Rules of Professional Conduct, Rule 1.1, (2004) 11/11/2008 4
  • 5. Ethical Expectations “Reasonable” or “reasonably” when used in relation to conduct by a lawyer denotes the conduct of a reasonably prudent and competent lawyer*. *ABA Model Rules of Professional Conduct, Rule 1.0(h), (2004) 11/11/2008 5
  • 6. Ethical Expectations What is reasonable in relation to a lawyer’s understanding of technology? • Understanding of technology requirements. Create (ESI) | Connect | Communicate | Collaborate | Conduct (Management) • Understanding of technology related requests. eMail | eFiling | Meet and Confer | Collection | Production | Storage • Ability to articulate technology and requirements. Legal Team| Client | Opposing Counsel | Jury | Judge 11/11/2008 6
  • 7. Efficient Technology Five critical areas in relation to a lawyer’s understanding of technology: • Creation (ESI*). • Connectivity. • Communication. • Collaboration. • Conduct (Management). *ESI: Electronically Stored Information = all information on computers. 11/06, Third Branch 11/11/2008 7
  • 8. Legal Technology Reference Model High Conduct Internal Support (Management) Collaboration Communication Connectivity Creation Low High Technology Capability 11/11/2008 8
  • 9. Efficient Technology Technology enables the creation of Electronically Stored Information. •Data Structures. Structured | Unstructured •Data Formats. Still Image | Moving Image | Sound |Textual |Web Archive | Generic • Data Volume. Uncompressed | Compressed •Data Security. Unencrypted | Encrypted •Data States. Active | Static | Residual 11/11/2008 9
  • 10. Economic Technology Technology enables the creation of Electronically Stored Information. Hardware •Personal Computer •Data Structures. •Monitor •Network Interface Capability (Wire and/or Wireless) •Data Formats. •Electrical Protection System •Storage Backup • Data Volume. •Multifunction Printer/Scanner/Fax •Data Security. Software •Data States. •Operating System •Productivity Suite •Email Enablement Application •Security Suite (AntiVirus/Spyware) •Media Playing Application •HTML Viewing Application •PDF Creation/Viewer Application •Compression/Decompression Application 11/11/2008 10
  • 11. Efficient Technology Connectivity of technology accelerates efficiency. •Personal Area Networks. •Local Area Networks •Campus Area Networks. •Metro Area Networks. •Wide Area Networks. •InterNetworks. •Data Storage Networks. 11/11/2008 11
  • 12. Economic Technology Connectivity of technology accelerates efficiency. Hardware •Personal Area Networks. •Server •Local Area Networks •Electrical Protection System •Network Switch / Router (Wire and/or Wireless) •Campus Area Networks. •Storage Backup •Metro Area Networks. Software •Wide Area Networks. •Server Operating System •Server Security Suite (AntiVirus/Spyware) •InterNetworks. •Firewall* •Data Storage Networks. Service •Internet Connectivity *Firewall can be hardware and/or software enabled. 11/11/2008 12
  • 13. Efficient Technology Communication is the benefit of Connectivity. •eMail. •Instant Messaging. •Podcasts/Videocasts. •SMS/Text Messages. •RSS Feeds. •Voice Mail. •Webinars. •Websites. *Integrated or External. 11/11/2008 13
  • 14. Economic Technology Communication is the benefit of Connectivity. Hardware* •eMail. •Video Camera •Instant Messaging. •Microphone Software •Podcasts/Videocasts. •Server Email Enablement Application •SMS/Text Messages. •Server File Sharing Application •Instant Messaging Application •RSS Feeds. •RSS Feed Reader •Voice Mail. Service •Webinars. •Instant Messaging Service •SMS/Text Messaging Service •Websites. •Voice Mail Service •Webinar Service •Website Host *Integrated or External. 11/11/2008 14
  • 15. Efficient Technology Collaboration is the benefit of connected communication. •Blogs. •Conferencing Applications. •Message Boards. •Wikis. *Can be delivered via server software and/or online service provider. 11/11/2008 15
  • 16. Economic Technology Collaboration is the benefit of connected communication. Hardware •Blogs. •Video Camera •Microphone •Conferencing Applications. Software •Message Boards. •Blog Enablement Application* •Wikis. •Online Conferencing Application* •Message Board Enablement Application.* •Wiki Enablement Application* Service •Blog Service* •Online Conferencing Service* •Message Board Service.* •Wiki Service* *Can be delivered via server software and/or online service provider. 11/11/2008 16
  • 17. Efficient Technology Conduct (Management) of technology is reasonable. • Billing and Accounting. • Case Management. • Document Management. • Information Backup. *Can be delivered via server software and/or online service provider. 11/11/2008 17
  • 18. Economic Technology Conduct (Management) of technology is reasonable. Hardware • Billing and Accounting. •External Storage Capability • Case Management. Software • Document Management. •Billing and Accounting Application* •Case Management Application* • Information Backup. •Document Management Application.* •Automated Information Backup System Service •Billing and Accounting Application* •Case Management Application* •Document Management Application.* *Can be delivered via server software and/or online service provider. 11/11/2008 18
  • 19. Legal Technology Reprise Are you competent in leveraging technology in representing clients*? Is your knowledge, and skill, in relation to technology reasonable*? *ABA Model Rules of Professional Conduct, Rule 1.1, (2004) 11/11/2008 19
  • 20. Technology in the Practice of Law As a general rule, the most successful man in life is the man who has the best information. Benjamin Disraeli 11/11/2008 20