SlideShare a Scribd company logo
1 of 16
Just the Basics: An E-Discovery 
Primer for Paralegals and 
Litigation Support 
Royce F. Cohen 
Michael Quartararo 
Stroock & Stroock & Lavan LLP 
September 3, 2014
ACEDS Membership Benefits 
Training, Resources and Networking for the 
E-Discovery Community 
Exclusive News and Analysis 
Weekly Web Seminars 
Podcasts 
On-Demand Training 
Networking 
Resources 
Jobs Board & Career Center 
bits + bytes Newsletter 
CEDS Certification 
And Much More! 
“ACEDS provides an excellent, much needed forum to train, network and stay current 
on critical information.” 
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale 
Join Today! aceds.org/join
ENTER 
‘STROOCK20’ 
Send questions and comments to Robert Hilson at rhilson@aceds.org
Presenters 
Royce F. Cohen 
rcohen@stroock.com 
As Special Counsel at Stroock & Stroock & Lavan LLP, based in New York, Royce is a 
founding member and co-chair of Stroock’s eDiscovery and Information Governance Practice 
Group. She is also a member of the Sedona Conference, Working Group 1. Royce has 
extensive experience representing both insurers and reinsurers in complex insurance and 
reinsurance matters. She has led some of the firm’s largest electronic discovery projects, from 
the collection of ESI, through processing, review and production. She frequently speaks and 
moderates panel discussions and CLE presentations on topics related to electronic discovery 
and her reinsurance practice. 
Michael Quartararo 
mquartararo@stroock.com 
As Director of Litigation Support Services at Stroock & Stroock & Lavan LLP, Mike is 
responsible for the development and implementation of Firm policy relating to electronic 
discovery and the development of ediscovery best practices, project-oriented protocols, and 
the design and delivery of training programs. As a member the Firm’s eDiscovery and 
Information Governance Practice Group, Mike regularly consults with attorneys and clients on 
electronic discovery issues. Mike is a certified Project Management Professional, a Certified 
E-Discovery Specialist, and a member of the ACEDS Advisory Board. He is also a part-time 
graduate instructor of ediscovery and project management and an advisory board member at 
Bryan University.
Presentation Overview 
• The Electronic Discovery Reference Model (EDRM) 
• Information Governance 
• Identification 
• Preservation 
• Collection 
• Processing 
• Review and Analysis 
• Production 
• Presentation
First, the Facts 
Hypothetical Scenario: 
• Party A and Party B enter into a contract incepting 1/1/09 
• Pursuant to the Contract, payments are made by Party B quarterly 
• Party B has not made a payment since 1/1/13 
• Party A files a complaint on 4/1/14 alleging that Party B breached the contract 
among other allegations 
• You represent Party B 
• Party B has two offices – one in San Francisco and the other in Denver. 
• Each office has their own file server on which local user files are created and stored 
related to that office. There is one email server for the entire company in San 
Francisco. All employees use Windows-based PCs in the office, except 
salespeople, who also utilize laptops while traveling. Senior and middle 
management have Blackberry and smartphone mobile devices, and all email on 
those devices passes through the email server. Text and phone messages are not 
captured or retained. Backup tapes exist for the previous 12 months only.
The EDRM
Information Governance 
Information Governance (IG) pertains to a client organization’s 
internal policies and practices related to records and information 
management, including how they create, store, secure and 
manage ESI and paper documents. 
• IG is a client Responsibility 
• IG maximizes the value of information and minimizes risk 
• IG saves time and reduces cost 
• It’s not just records management 
• And it’s not just policies 
Is your client prepared for litigation?
Identification 
Identification is the process of identifying reasonably accessible 
sources of ESI and documents that may be relevant to litigation. 
• Confer with client and client IT personnel 
• Determining the scope of the project 
• Learn about the client systems (interviews, data map, questionnaire) 
• Identify people who may possess relevant information (Custodians) 
• Identify the relevant date range 
• Most common sources of ESI 
– Email servers 
– File Servers 
– PCs and laptops 
• Estimate the volume of potentially relevant ESI
Preservation 
Preservation is the process of ensuring that ESI is protected 
against alteration, deletion or destruction. 
• The preservation process involves two steps: 
1. Implement a litigation hold within the client organization 
2. Sequester the ESI (either through collection or otherwise) 
• The obligation to preserve ESI stems from the common law 
• The obligation is the clients and counsel 
• Document the process
Collection 
Collection is the process of physically and defensibly gathering 
ESI and documents from identified sources within a client 
organization. 
• Factors to consider: 
– Sources of ESI 
– Accessibility of data 
– Number of custodians 
– Size/volume of collection 
• Collection tools and procedures 
• Acquisition report 
• Chain of custody documentation
Processing 
Processing: involves the use of software to convert ESI to forms 
more suitable for review and analysis. 
• Two goals in processing: 
– Reduce volume of ESI 
– Unify ESI for systematic review 
• Extract and index metadata and text 
• De-NISTing, De-duplication and Search 
• Reporting and exceptions 
• Deliverable: Tiff images, native files, metadata and text
Review and Analysis 
Document review and analysis is the process of reviewing and 
evaluating ESI and documents for content and context and then 
coding for responsiveness and privilege in preparation for 
production to other parties. 
• Goals 
• Define scope 
• Responsiveness Coding & Issue Coding 
• Confidentiality 
• General Rules 
• Use of Analytics/Predictive Coding 
• Quality Control
Production 
• Production is the process of preparing and delivering ESI and 
documents to other parties in appropriate forms and using 
appropriate delivery mechanisms. 
• Identify documents to produce 
• Prepare a written production specification 
• Form of production 
• Quality control
Presentation 
• Presentation involves displaying ESI before people and 
audiences (at depositions, hearings, trials, etc.), to elicit further 
information, validate existing facts or positions, or persuade an 
audience. 
• From one Million to one Hundred 
• Exhibit preparation 
• Using technology to present evidence
Questions

More Related Content

What's hot

BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counselDan Michaluk
 
electronic data interchange
electronic data interchange electronic data interchange
electronic data interchange preetikapri1
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?Logikcull.com
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board CommunicationsOnBoard
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
LVA Electronic Records Management
LVA Electronic Records ManagementLVA Electronic Records Management
LVA Electronic Records ManagementPaul Neal
 
Litchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionLitchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionMatt Smith
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...David Cunningham
 

What's hot (18)

Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
electronic data interchange
electronic data interchange electronic data interchange
electronic data interchange
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Information Security
Information SecurityInformation Security
Information Security
 
LVA Electronic Records Management
LVA Electronic Records ManagementLVA Electronic Records Management
LVA Electronic Records Management
 
5 things municipal lawyers need to know about eDiscovery
5 things municipal lawyers need to know about eDiscovery5 things municipal lawyers need to know about eDiscovery
5 things municipal lawyers need to know about eDiscovery
 
Litchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionLitchfield County Computer – An Introduction
Litchfield County Computer – An Introduction
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 

Viewers also liked

Ppt day in the life of a case manager final v 2
Ppt day in the life of a case manager    final v 2Ppt day in the life of a case manager    final v 2
Ppt day in the life of a case manager final v 2Robbie Hilson
 
Question 1 evaluation 2
Question 1 evaluation 2Question 1 evaluation 2
Question 1 evaluation 2Ethomas5
 
Leçon 116 - Énoncé et pratique
Leçon 116 - Énoncé et pratiqueLeçon 116 - Énoncé et pratique
Leçon 116 - Énoncé et pratiquePierrot Caron
 
Section VI - Peur et conflit
Section VI - Peur et conflitSection VI - Peur et conflit
Section VI - Peur et conflitPierrot Caron
 
Who will hire me
Who will hire meWho will hire me
Who will hire met301955
 
The Ethics of Predictive Coding
The Ethics of Predictive CodingThe Ethics of Predictive Coding
The Ethics of Predictive CodingRobbie Hilson
 
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.Pierrot Caron
 
Section VI - L'illusion des besoins
Section VI - L'illusion des besoinsSection VI - L'illusion des besoins
Section VI - L'illusion des besoinsPierrot Caron
 
Leçon 117 - Énoncé et pratique
Leçon 117 - Énoncé et pratiqueLeçon 117 - Énoncé et pratique
Leçon 117 - Énoncé et pratiquePierrot Caron
 
Leçon 69 - Énoncé et pratique
Leçon 69 - Énoncé et pratiqueLeçon 69 - Énoncé et pratique
Leçon 69 - Énoncé et pratiquePierrot Caron
 
ACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastRobbie Hilson
 
Question 1 evaluation
Question 1 evaluationQuestion 1 evaluation
Question 1 evaluationEthomas5
 
Aceds presentation formatted final v2
Aceds presentation formatted final v2Aceds presentation formatted final v2
Aceds presentation formatted final v2Robbie Hilson
 
Leçon 110 - Énoncé et pratique
Leçon 110 - Énoncé et pratiqueLeçon 110 - Énoncé et pratique
Leçon 110 - Énoncé et pratiquePierrot Caron
 
LEÇON 99 – Le salut est ma seule fonction ici.
LEÇON 99 – Le salut est ma seule fonction ici.LEÇON 99 – Le salut est ma seule fonction ici.
LEÇON 99 – Le salut est ma seule fonction ici.Pierrot Caron
 
Leçon 115 - Énoncé et pratique
Leçon 115 - Énoncé et pratiqueLeçon 115 - Énoncé et pratique
Leçon 115 - Énoncé et pratiquePierrot Caron
 
Leçon 99 - Énoncé et pratique
Leçon 99 - Énoncé et pratiqueLeçon 99 - Énoncé et pratique
Leçon 99 - Énoncé et pratiquePierrot Caron
 

Viewers also liked (20)

Ppt day in the life of a case manager final v 2
Ppt day in the life of a case manager    final v 2Ppt day in the life of a case manager    final v 2
Ppt day in the life of a case manager final v 2
 
Question 1 evaluation 2
Question 1 evaluation 2Question 1 evaluation 2
Question 1 evaluation 2
 
Leçon 116 - Énoncé et pratique
Leçon 116 - Énoncé et pratiqueLeçon 116 - Énoncé et pratique
Leçon 116 - Énoncé et pratique
 
Section VI - Peur et conflit
Section VI - Peur et conflitSection VI - Peur et conflit
Section VI - Peur et conflit
 
Who will hire me
Who will hire meWho will hire me
Who will hire me
 
The Ethics of Predictive Coding
The Ethics of Predictive CodingThe Ethics of Predictive Coding
The Ethics of Predictive Coding
 
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.
LEÇON 125 – Dans la quiétude je reçois la Parole de Dieu aujourd’hui.
 
Leçon 57 résumé
Leçon 57   résuméLeçon 57   résumé
Leçon 57 résumé
 
Section VI - L'illusion des besoins
Section VI - L'illusion des besoinsSection VI - L'illusion des besoins
Section VI - L'illusion des besoins
 
Leçon 117 - Énoncé et pratique
Leçon 117 - Énoncé et pratiqueLeçon 117 - Énoncé et pratique
Leçon 117 - Énoncé et pratique
 
Leçon 69 - Énoncé et pratique
Leçon 69 - Énoncé et pratiqueLeçon 69 - Énoncé et pratique
Leçon 69 - Énoncé et pratique
 
ACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 Webcast
 
Question 1 evaluation
Question 1 evaluationQuestion 1 evaluation
Question 1 evaluation
 
Aceds presentation formatted final v2
Aceds presentation formatted final v2Aceds presentation formatted final v2
Aceds presentation formatted final v2
 
Leçon 110 - Énoncé et pratique
Leçon 110 - Énoncé et pratiqueLeçon 110 - Énoncé et pratique
Leçon 110 - Énoncé et pratique
 
LEÇON 99 – Le salut est ma seule fonction ici.
LEÇON 99 – Le salut est ma seule fonction ici.LEÇON 99 – Le salut est ma seule fonction ici.
LEÇON 99 – Le salut est ma seule fonction ici.
 
Leçon 115 - Énoncé et pratique
Leçon 115 - Énoncé et pratiqueLeçon 115 - Énoncé et pratique
Leçon 115 - Énoncé et pratique
 
Fundamente
FundamenteFundamente
Fundamente
 
Leçon 99 - Énoncé et pratique
Leçon 99 - Énoncé et pratiqueLeçon 99 - Énoncé et pratique
Leçon 99 - Énoncé et pratique
 
Sanim
SanimSanim
Sanim
 

Similar to ACEDS-Stroock 9-4-14 Webcast Presentation

10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information GovernanceEliseT2015
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangleDavid Kearney
 
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10knugent
 
Aceds 2015 wie nycpa final oct panel slides
Aceds 2015 wie nycpa   final oct panel slidesAceds 2015 wie nycpa   final oct panel slides
Aceds 2015 wie nycpa final oct panel slidesJoe Bartolo
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your InformationAIIM International
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docxsusanschei
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response serviceSeccuris Inc.
 
Practical Data Management Plans
Practical Data Management PlansPractical Data Management Plans
Practical Data Management PlansIUPUI
 
eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery PerspectiveRuss Gould
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligenceMichael Burgess
 
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds Sutherland
 
Improve ROI and Productivity with Content Cleansing and Enterprise Search
Improve ROI and Productivity with Content Cleansing and Enterprise SearchImprove ROI and Productivity with Content Cleansing and Enterprise Search
Improve ROI and Productivity with Content Cleansing and Enterprise SearchPerficient, Inc.
 

Similar to ACEDS-Stroock 9-4-14 Webcast Presentation (20)

10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10
 
Aceds 2015 wie nycpa final oct panel slides
Aceds 2015 wie nycpa   final oct panel slidesAceds 2015 wie nycpa   final oct panel slides
Aceds 2015 wie nycpa final oct panel slides
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
Practical Data Management Plans
Practical Data Management PlansPractical Data Management Plans
Practical Data Management Plans
 
eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery Perspective
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligence
 
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
 
Improve ROI and Productivity with Content Cleansing and Enterprise Search
Improve ROI and Productivity with Content Cleansing and Enterprise SearchImprove ROI and Productivity with Content Cleansing and Enterprise Search
Improve ROI and Productivity with Content Cleansing and Enterprise Search
 

Recently uploaded

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 

Recently uploaded (20)

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 

ACEDS-Stroock 9-4-14 Webcast Presentation

  • 1. Just the Basics: An E-Discovery Primer for Paralegals and Litigation Support Royce F. Cohen Michael Quartararo Stroock & Stroock & Lavan LLP September 3, 2014
  • 2. ACEDS Membership Benefits Training, Resources and Networking for the E-Discovery Community Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More! “ACEDS provides an excellent, much needed forum to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale Join Today! aceds.org/join
  • 3. ENTER ‘STROOCK20’ Send questions and comments to Robert Hilson at rhilson@aceds.org
  • 4. Presenters Royce F. Cohen rcohen@stroock.com As Special Counsel at Stroock & Stroock & Lavan LLP, based in New York, Royce is a founding member and co-chair of Stroock’s eDiscovery and Information Governance Practice Group. She is also a member of the Sedona Conference, Working Group 1. Royce has extensive experience representing both insurers and reinsurers in complex insurance and reinsurance matters. She has led some of the firm’s largest electronic discovery projects, from the collection of ESI, through processing, review and production. She frequently speaks and moderates panel discussions and CLE presentations on topics related to electronic discovery and her reinsurance practice. Michael Quartararo mquartararo@stroock.com As Director of Litigation Support Services at Stroock & Stroock & Lavan LLP, Mike is responsible for the development and implementation of Firm policy relating to electronic discovery and the development of ediscovery best practices, project-oriented protocols, and the design and delivery of training programs. As a member the Firm’s eDiscovery and Information Governance Practice Group, Mike regularly consults with attorneys and clients on electronic discovery issues. Mike is a certified Project Management Professional, a Certified E-Discovery Specialist, and a member of the ACEDS Advisory Board. He is also a part-time graduate instructor of ediscovery and project management and an advisory board member at Bryan University.
  • 5. Presentation Overview • The Electronic Discovery Reference Model (EDRM) • Information Governance • Identification • Preservation • Collection • Processing • Review and Analysis • Production • Presentation
  • 6. First, the Facts Hypothetical Scenario: • Party A and Party B enter into a contract incepting 1/1/09 • Pursuant to the Contract, payments are made by Party B quarterly • Party B has not made a payment since 1/1/13 • Party A files a complaint on 4/1/14 alleging that Party B breached the contract among other allegations • You represent Party B • Party B has two offices – one in San Francisco and the other in Denver. • Each office has their own file server on which local user files are created and stored related to that office. There is one email server for the entire company in San Francisco. All employees use Windows-based PCs in the office, except salespeople, who also utilize laptops while traveling. Senior and middle management have Blackberry and smartphone mobile devices, and all email on those devices passes through the email server. Text and phone messages are not captured or retained. Backup tapes exist for the previous 12 months only.
  • 8. Information Governance Information Governance (IG) pertains to a client organization’s internal policies and practices related to records and information management, including how they create, store, secure and manage ESI and paper documents. • IG is a client Responsibility • IG maximizes the value of information and minimizes risk • IG saves time and reduces cost • It’s not just records management • And it’s not just policies Is your client prepared for litigation?
  • 9. Identification Identification is the process of identifying reasonably accessible sources of ESI and documents that may be relevant to litigation. • Confer with client and client IT personnel • Determining the scope of the project • Learn about the client systems (interviews, data map, questionnaire) • Identify people who may possess relevant information (Custodians) • Identify the relevant date range • Most common sources of ESI – Email servers – File Servers – PCs and laptops • Estimate the volume of potentially relevant ESI
  • 10. Preservation Preservation is the process of ensuring that ESI is protected against alteration, deletion or destruction. • The preservation process involves two steps: 1. Implement a litigation hold within the client organization 2. Sequester the ESI (either through collection or otherwise) • The obligation to preserve ESI stems from the common law • The obligation is the clients and counsel • Document the process
  • 11. Collection Collection is the process of physically and defensibly gathering ESI and documents from identified sources within a client organization. • Factors to consider: – Sources of ESI – Accessibility of data – Number of custodians – Size/volume of collection • Collection tools and procedures • Acquisition report • Chain of custody documentation
  • 12. Processing Processing: involves the use of software to convert ESI to forms more suitable for review and analysis. • Two goals in processing: – Reduce volume of ESI – Unify ESI for systematic review • Extract and index metadata and text • De-NISTing, De-duplication and Search • Reporting and exceptions • Deliverable: Tiff images, native files, metadata and text
  • 13. Review and Analysis Document review and analysis is the process of reviewing and evaluating ESI and documents for content and context and then coding for responsiveness and privilege in preparation for production to other parties. • Goals • Define scope • Responsiveness Coding & Issue Coding • Confidentiality • General Rules • Use of Analytics/Predictive Coding • Quality Control
  • 14. Production • Production is the process of preparing and delivering ESI and documents to other parties in appropriate forms and using appropriate delivery mechanisms. • Identify documents to produce • Prepare a written production specification • Form of production • Quality control
  • 15. Presentation • Presentation involves displaying ESI before people and audiences (at depositions, hearings, trials, etc.), to elicit further information, validate existing facts or positions, or persuade an audience. • From one Million to one Hundred • Exhibit preparation • Using technology to present evidence

Editor's Notes

  1. Hello and welcome to this ACEDS webcast, “Just the Basics: An E-Discovery Primer for Paralegals and Litigation Support,” presented by Stroock & Stroock & Lavan. I’m your host Robert Hilson of ACEDS and I’m joined today by two excellent presenters who I’ll introduce in a moment, but first I have a couple of brief announcements.
  2. For those of you who aren’t familiar with us, We are a members-only association that provides training, resources, and networking to the e-discovery community. We also offer the Certified E-Discovery Specialist credential, which is held by hundreds of professional across the Americas, Europe and Asia. You can join today and start receiving a number of benefits exclusive to our members, including news content, on-demand web seminars, our bits+bytes newsletter and discounts on certification and our West Coast E-Discovery Summit in October.
  3. The presentation today is intended to give attendees to our West Coast E-Discovery Summit, and those who are new to the field, a baseline understanding of the e-discovery practices common to paralegals and litigation support professionals. If you want a deeper dive, I encourage you to register to attend either in person or online for the Summit. We will be gathering at the historic Westin St. Francis in San Francisco on October 21 and 22. We have a great lineup of presenters, one of whom you’ll hear from today. And it’s their mission to broaden both your e-discovery skill set and career opportunities in the field. It should be a really neat event. You can register now for as low as $295. If that’s going to break the bank for you, send me an email at rhilson@aceds.org and we can work something out… And as a special thank you for attending today’s program, if you enter the code “STROOCK20,” you will receive a 20 percent discount.
  4. So without further adieu, I’d like to introduce the two great presenters I mentioned. Royce Cohen is an attorney at Stroock in New York who is a founding member and co-chair of the firm’s E-Discovery and Information Governance Practice Group. She is also an active participant of the Sedona Conference Working Group 1. Royce has extensive experience representing both insurers and reinsurers in complex matters. And she has handled some of the firm’s largest e-discovery projects, from collection, through to processing, review and production. She also presented at the ACEDS Annual Conference this past spring, and we’re very happy to have her back. Royce, thanks for being here. Royce is joined by Mike Quartaro, director of litigation support services at Stroock where he is responsible for development and implementation of firm policy relating to e-discovery and the development of e-discovery best practices, as well as project-oriented protocols, and the design and delivery of training programs. He is also a member of the firm’s E-Discovery and Information Goverance Practice Group, and regularly consults with attorneys and clients on e-discovery. Mike is also a member of the advisory boards of Bryan University and ACEDS, is CEDS certified, and was instrumental in helping to create the certification. And he’ll be presenting at the West Coast Summit in October. Mike, it’s been a while. How you doing? Okay, I’m going to turn it over to Mike and Royce to go over the agenda for today’s program and get started. But I want to first encourage everyone to ask questions through the question box on the right of your screen. And we’ll try to field as many as possible during the course of the presentation.