SlideShare a Scribd company logo
1 of 1
Download to read offline
Internal Vs Outsourced E-Disclosure
If documents only ever existed in hard copy form, the whole process of electronic
disclosure would be much simpler. There is no definitive list of what constitutes a
document and the definition is broad for a reason. Within the last decade technological
innovation has exploded; as a result, the way in which information is stored is fluid and
constantly changing. This is one of the main challenges when identifying relevant
documents for disclosure.
The inclusion of electronic documents in the process of edisclosure introduces an
additional layer of complexity, so much so that there is an entire Practice Direction (31B)
dedicated to it. To be clear, at no point in Part 31 or PD31B does it state that a third
party should be instructed to assist with this process? If a party feels that it is able to
satisfy the requirements of a reasonable search and the five principles of PD31B, this is a
totally valid approach. The five principles are:
1. Electronic Documents should be managed efficiently in order to minimise the cost
incurred
2. Technology should be used in order to ensure that document management
activities are undertaken efficiently and effectively
3. Disclosure should be given in a manner which gives effect to the overriding
objective
4. Electronic Documents should generally be made available for inspection in a form
which allows the party receiving the documents the same ability to access,
search, review and display the documents as the party giving disclosure;
5. Disclosure of Electronic Documents which are of no relevance to the proceedings
may place an excessive burden in time and cost on the party to whom disclosure
is given.
The difficulties that will be faced by most parties in attempting to undertake their own e-
disclosure exercise is in handling and searching large volumes of data in a controlled
manner. A common approach is to instruct each custodian to search their own data and
provide a copy of responsive files. Consider that a group of custodians each searching
their data will all do so in their own way, each making their own decisions on what is and
is not relevant, and it is easy to see how documents can be overlooked.
Client-led e-disclosure can be a simple and cost-effective way of disclosing electronic
documents, but clients should be aware of the risks of failing to provide adequate
disclosure. In Earls v Barclays Bank Plc [2009] EWHC 2500, adverse costs orders were
made against a party who failed to search and disclose relevant documents. We often
say to our clients that instructing a third party should be considered in cases where:
 There exists significant volumes of electronic documents
 There exists significant disparate sources of electronic documents
 The electronic documents to be disclosed are material to the case;
 The absence of electronic documents may be material to the case.
The UK’s leading supplier of electronic disclosure and digital forensics consultancy
includes: computer forensics, mobile phone forensics and digital investigation services.
Home About News Publications Blog Contact

More Related Content

Viewers also liked

So funktioniert erfolgreiches Facebook-Marketing
So funktioniert erfolgreiches Facebook-Marketing So funktioniert erfolgreiches Facebook-Marketing
So funktioniert erfolgreiches Facebook-Marketing Martin Szugat
 
Primjena društvene mreže twitter u poslovanju
Primjena društvene mreže twitter u poslovanjuPrimjena društvene mreže twitter u poslovanju
Primjena društvene mreže twitter u poslovanjuasvaglic
 
Contracts - A Primer 20150421
Contracts - A Primer 20150421Contracts - A Primer 20150421
Contracts - A Primer 20150421James Kosa
 
El grafeno
El grafenoEl grafeno
El grafenoalemo42
 
Koristenje drustvenih mreza u poslovanju WinDays 2012
Koristenje drustvenih mreza u poslovanju WinDays 2012Koristenje drustvenih mreza u poslovanju WinDays 2012
Koristenje drustvenih mreza u poslovanju WinDays 2012Ilija Brajković
 
Csec physical education and sport syllabus
Csec physical education and sport syllabusCsec physical education and sport syllabus
Csec physical education and sport syllabusWahyah Seh
 

Viewers also liked (9)

So funktioniert erfolgreiches Facebook-Marketing
So funktioniert erfolgreiches Facebook-Marketing So funktioniert erfolgreiches Facebook-Marketing
So funktioniert erfolgreiches Facebook-Marketing
 
D mi correo 2
D mi correo 2D mi correo 2
D mi correo 2
 
Tutto prezi
Tutto preziTutto prezi
Tutto prezi
 
Primjena društvene mreže twitter u poslovanju
Primjena društvene mreže twitter u poslovanjuPrimjena društvene mreže twitter u poslovanju
Primjena društvene mreže twitter u poslovanju
 
Contracts - A Primer 20150421
Contracts - A Primer 20150421Contracts - A Primer 20150421
Contracts - A Primer 20150421
 
El grafeno
El grafenoEl grafeno
El grafeno
 
Koristenje drustvenih mreza u poslovanju WinDays 2012
Koristenje drustvenih mreza u poslovanju WinDays 2012Koristenje drustvenih mreza u poslovanju WinDays 2012
Koristenje drustvenih mreza u poslovanju WinDays 2012
 
Presentacion enfoque del sistemaok[1]
Presentacion enfoque del sistemaok[1]Presentacion enfoque del sistemaok[1]
Presentacion enfoque del sistemaok[1]
 
Csec physical education and sport syllabus
Csec physical education and sport syllabusCsec physical education and sport syllabus
Csec physical education and sport syllabus
 

Similar to Internal vs outsourced e disclosure

E discovery keynote
E discovery keynoteE discovery keynote
E discovery keynoteDavid Harvey
 
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009kecurrey
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model orderSeth Row
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
Pre-CMC E-Disclosure Timeline
Pre-CMC E-Disclosure Timeline Pre-CMC E-Disclosure Timeline
Pre-CMC E-Disclosure Timeline cclgroup
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Osler, Hoskin & Harcourt LLP
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidencewcodell
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionJeffJohnson442
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalAubrey Owens
 
Why is it important to master the document review process.pdf
Why is it important to master the document review process.pdfWhy is it important to master the document review process.pdf
Why is it important to master the document review process.pdfProteus Discovery Group
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
ZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - NuixNuix
 

Similar to Internal vs outsourced e disclosure (20)

E discovery keynote
E discovery keynoteE discovery keynote
E discovery keynote
 
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model order
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
Pre-CMC E-Disclosure Timeline
Pre-CMC E-Disclosure Timeline Pre-CMC E-Disclosure Timeline
Pre-CMC E-Disclosure Timeline
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selection
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
 
Why is it important to master the document review process.pdf
Why is it important to master the document review process.pdfWhy is it important to master the document review process.pdf
Why is it important to master the document review process.pdf
 
Fiachra Moody - E-Discovery
Fiachra Moody - E-DiscoveryFiachra Moody - E-Discovery
Fiachra Moody - E-Discovery
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
ZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-house
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Internal vs outsourced e disclosure

  • 1. Internal Vs Outsourced E-Disclosure If documents only ever existed in hard copy form, the whole process of electronic disclosure would be much simpler. There is no definitive list of what constitutes a document and the definition is broad for a reason. Within the last decade technological innovation has exploded; as a result, the way in which information is stored is fluid and constantly changing. This is one of the main challenges when identifying relevant documents for disclosure. The inclusion of electronic documents in the process of edisclosure introduces an additional layer of complexity, so much so that there is an entire Practice Direction (31B) dedicated to it. To be clear, at no point in Part 31 or PD31B does it state that a third party should be instructed to assist with this process? If a party feels that it is able to satisfy the requirements of a reasonable search and the five principles of PD31B, this is a totally valid approach. The five principles are: 1. Electronic Documents should be managed efficiently in order to minimise the cost incurred 2. Technology should be used in order to ensure that document management activities are undertaken efficiently and effectively 3. Disclosure should be given in a manner which gives effect to the overriding objective 4. Electronic Documents should generally be made available for inspection in a form which allows the party receiving the documents the same ability to access, search, review and display the documents as the party giving disclosure; 5. Disclosure of Electronic Documents which are of no relevance to the proceedings may place an excessive burden in time and cost on the party to whom disclosure is given. The difficulties that will be faced by most parties in attempting to undertake their own e- disclosure exercise is in handling and searching large volumes of data in a controlled manner. A common approach is to instruct each custodian to search their own data and provide a copy of responsive files. Consider that a group of custodians each searching their data will all do so in their own way, each making their own decisions on what is and is not relevant, and it is easy to see how documents can be overlooked. Client-led e-disclosure can be a simple and cost-effective way of disclosing electronic documents, but clients should be aware of the risks of failing to provide adequate disclosure. In Earls v Barclays Bank Plc [2009] EWHC 2500, adverse costs orders were made against a party who failed to search and disclose relevant documents. We often say to our clients that instructing a third party should be considered in cases where:  There exists significant volumes of electronic documents  There exists significant disparate sources of electronic documents  The electronic documents to be disclosed are material to the case;  The absence of electronic documents may be material to the case. The UK’s leading supplier of electronic disclosure and digital forensics consultancy includes: computer forensics, mobile phone forensics and digital investigation services. Home About News Publications Blog Contact