SlideShare a Scribd company logo
1 of 36
CUSTODIAN INTERVIEWS
MAXIMIZING A VALUABLE OPPORTUNITY
Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical
information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
SPEAKERS
 Matthew Verga, J.D.
– Director, Content Marketing and eDiscovery Strategy,
Modus eDiscovery Inc.
– Matthew Verga has spent the past eight years working in
electronic discovery, four years as a practicing attorney with an
AmLaw 100 firm and four years as a consultant with national
electronic discovery service providers. Matthew has personally
designed and managed many large scale electronic discovery
efforts and has overseen the design and management of many
more as both an attorney and a consultant. As a consultant,
Matthew has counseled substantial companies and law firms
at both the matter and the enterprise level.
– As the Director of Content Marketing and eDiscovery Strategy
for Modus eDiscovery Inc., Matthew is responsible both for
enterprise-level consulting engagements and for the creation
of articles, white papers, webinars and workshops in support
of Modus’s thought leadership efforts.
SPEAKERS
 Gary Torgersen, CCE, EnCE
– Manager of Forensic Services, Modus eDiscovery Inc.
– A seasoned forensics expert, Gary Torgersen possesses more
than 12 years experience in the eDiscovery and digital forensics
industry. He stays on the cutting edge of technology to meet
the needs of his clients, including creating custom collection
processes and platforms and developing proprietary technology
assisted review programs and workflows.
– As Manager of Forensic Services for Modus eDiscovery, Gary
oversees and manages the Modus Forensics and Collections
department. Gary oversees and conducts data collections,
performs computer forensic analysis, and provides reporting, in
conjunction with clients and Modus Project Management and
Data Management teams. Gary also testifies in court on behalf
of clients, and is responsible for preparing affidavits and giving
depositions.
PROGRAM AGENDA
 Why They Matter
 Who to Interview
 What to Ask
 How to Document Answers
 When to Leverage the Results
 Key Takeaways
 Questions and Answers
WHY THEY MATTER
WHY THEY MATTER
 Three main reasons:
– Satisfying preservation obligations
– Gathering valuable discovery intelligence
– Disseminating important litigation information
 Satisfying preservation obligations
– Custodians are key information sources
– They know what exists
– They know where it is or is likely to be
WHY THEY MATTER, CONT.
 Valuable discovery intelligence
– Direct information regarding
o Device usage
o Software usage
o File storage practices
o Backup practices
o Communication practices
– Relative priority of people and sources
– Likely content (form and substance) of sources
WHY THEY MATTER, CONT.
 Information dissemination
– Disinformation and rumor common
– Opportunity to directly disseminate details and answer questions
– Opportunity to ensure hold understanding and compliance
– Opportunity to get face to face with key individuals
WHO TO INTERVIEW
WHO TO INTERVIEW
 In general, three buckets to be filled:
– Key custodians
– Representative custodians
– Departmental custodians
 Key custodians
– Who they are
– Why they matter
– Priority
WHO TO INTERVIEW, CONT.
 Representative custodians
– Who they are
– Why they matter
– When they are used
 Departmental custodians
– Who they are
– Why they matter
– How they differ
WHAT TO ASK
WHAT TO ASK
 Introduction to script concept
 Script development process
– Participants
 Use of templates or previous scripts as starting point
 Tailored to respondents
WHAT TO ASK, CONT.
 Who they are
– Identity, role, and connections
 What they do
– Activities, materials used, and materials generated
 How they do it
– Paper, hardware, software, and other tools or systems
WHAT TO ASK, CONT.
 With whom they communicate
– Internal and external, related to the matter, other suggestions
 How they communicate
– E-mail, text, voice, chat, paper, etc.
 Whether they understand and will comply
– Meaning of hold, meaning of interview, meaning of compliance
WHAT TO ASK, CONT.
 Device information
– Computers, mobile devices, storage devices/media, etc.
 Usage and practice information
– Software tools, file formats, local/network/cloud storage, etc.
 IT systems information
– Backup practices, janitorial functions, search and retrieval options, etc.
WHAT TO ASK, CONT.
WHAT TO ASK, CONT.
WHAT TO ASK, CONT.
HOW TO DOCUMENT ANSWERS
HOW TO DOCUMENT ANSWERS
 Three main approaches:
– Conversational interviews with manual recordation
– Scripted interviews with formatted recordation
– Automated “interviews” and recordation
 Conversational interviews with manual recordation
– Simplest and most traditional, one-on-one
o Can be started quickly and with little cost and allows you to speak with every
custodian
o BUT, yields inconsistent notes that are less useful and is time consuming when
custodians are numerous
HOW TO DOCUMENT ANSWERS, CONT.
 Scripted interviews with formatted recordation
– Closely follow a detailed script
– Record answers in a structured way to speed aggregation and enhance
utility
– Options include PDF forms, spreadsheets, and pre-formatted text
documents
o Yields more consistent, useful information, and multiple interviewers can conduct
identical interviews
o BUT requires more time and expense to start and is time consuming when
custodians are numerous
HOW TO DOCUMENT ANSWERS, CONT.
 Automated “interviews” and recordation
– No one-on-one interviews (at least initially)
– Electronic questionnaires or web-based surveys
o Easily scales to accommodate numerous custodians, produces consistent, easily-
used information, and custodians can be asked to sign and certify their answers
o BUT requires the most time and expense to start and there are none of the
peripheral benefits from speaking to all of the custodians
HOW TO DOCUMENT ANSWERS, CONT.
HOW TO DOCUMENT ANSWERS, CONT.
HOW TO DOCUMENT ANSWERS, CONT.
HOW TO DOCUMENT ANSWERS, CONT.
WHEN TO LEVERAGE THE RESULTS
WHEN TO LEVERAGE THE RESULTS
 Validation of preservation
– Confirm assumptions made about the appropriate scope of
preservation (i.e., what individuals, departments, and systems to
include) or to adjust that scope, if needed
– Confirm that all relevant individuals have understood, are complying
with, and will continue to comply with the preservation requirements
– Confirm that all relevant automated janitorial functions or back-up
media recycling have been identified and suspended
WHEN TO LEVERAGE THE RESULTS, CONT.
 Prioritization and organization of collection and processing
– Sources most likely to contain relevant data or documents can be
identified and prioritized ahead of all other sources.
– Sources unlikely to contain relevant data or documents can be
identified and excluded from collection and processing.
– The quantity and diversity of sources requiring collection and
processing can be determined and leveraged to inform decisions
regarding collection methodologies.
WHEN TO LEVERAGE THE RESULTS, CONT.
 Prioritization and customization of review
– The data and documents from the sources most likely to contain
relevant materials can be identified and prioritized ahead of the data
and documents from all other sources.
– Qualitative information from the custodians about the relevant
materials can be provided to the reviewers to enhance the quality and
efficiency of their review.
– Advance knowledge of privilege prevalence (and other content
attributes) can be used to inform better decisions about who should
review a particular set of materials and how they should be reviewed.
KEY TAKEAWAYS
KEY TAKEAWAYS
 WHY
– Preservation obligations
– Discovery intelligence
– Information dissemination
 WHO
– Key custodians
– Representative custodians
– Departmental custodians
 WHAT
– Identity
– Activities
– Communications
– Compliance
 HOW
– Conversational
– Scripted
– Automated
 WHEN
– Preservation
– Collection
– Review
Q / A

More Related Content

Similar to Custodian Interviews - How to Leverage a Valuable Opportunity

James Owens Resume 2018
James Owens Resume 2018James Owens Resume 2018
James Owens Resume 2018James Owens
 
RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05Alan Brooks
 
Contextual Inquiry V1
Contextual Inquiry V1Contextual Inquiry V1
Contextual Inquiry V1Rajesh Jha
 
20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic RecordsJesse Wilkins
 
Cff data governance best practices
Cff data governance best practicesCff data governance best practices
Cff data governance best practicesBeth Fitzpatrick
 
Bulletproof SharePoint Governance (#SP24 Session)
Bulletproof SharePoint Governance (#SP24 Session)Bulletproof SharePoint Governance (#SP24 Session)
Bulletproof SharePoint Governance (#SP24 Session)Nick Inglis
 
Creating a Data Management Plan for your Research
Creating a Data Management Plan for your ResearchCreating a Data Management Plan for your Research
Creating a Data Management Plan for your ResearchRobin Rice
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online caniceconsulting
 
Data Fluency - AUA Conference
Data Fluency - AUA ConferenceData Fluency - AUA Conference
Data Fluency - AUA ConferenceMartha Horler
 
T14 sustainability - 3 keys to avoiding ig failures - keith atteck
T14   sustainability - 3 keys to avoiding ig failures - keith atteckT14   sustainability - 3 keys to avoiding ig failures - keith atteck
T14 sustainability - 3 keys to avoiding ig failures - keith atteckKeith Atteck C.Tech. ERMm
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligenceMichael Burgess
 
Course Outline - Managing Electronic Records in Corporate RIM Systems
Course Outline - Managing Electronic Records in Corporate RIM Systems Course Outline - Managing Electronic Records in Corporate RIM Systems
Course Outline - Managing Electronic Records in Corporate RIM Systems Lorson Resources Limited
 
Ariadne: Data Management Planning
Ariadne: Data Management PlanningAriadne: Data Management Planning
Ariadne: Data Management Planningariadnenetwork
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
DC Salesforce1 Tour Data Governance Lunch Best Practices deck
DC Salesforce1 Tour Data Governance Lunch Best Practices deckDC Salesforce1 Tour Data Governance Lunch Best Practices deck
DC Salesforce1 Tour Data Governance Lunch Best Practices deckBeth Fitzpatrick
 

Similar to Custodian Interviews - How to Leverage a Valuable Opportunity (20)

Research Data Management and your PhD
Research Data Management and your PhDResearch Data Management and your PhD
Research Data Management and your PhD
 
James Owens Resume 2018
James Owens Resume 2018James Owens Resume 2018
James Owens Resume 2018
 
RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Contextual Inquiry V1
Contextual Inquiry V1Contextual Inquiry V1
Contextual Inquiry V1
 
20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records
 
Research-Data-Management-and-your-PhD
Research-Data-Management-and-your-PhDResearch-Data-Management-and-your-PhD
Research-Data-Management-and-your-PhD
 
Cff data governance best practices
Cff data governance best practicesCff data governance best practices
Cff data governance best practices
 
Digital Curation 101 - Taster
Digital Curation 101 - TasterDigital Curation 101 - Taster
Digital Curation 101 - Taster
 
Bulletproof SharePoint Governance (#SP24 Session)
Bulletproof SharePoint Governance (#SP24 Session)Bulletproof SharePoint Governance (#SP24 Session)
Bulletproof SharePoint Governance (#SP24 Session)
 
Creating a Data Management Plan for your Research
Creating a Data Management Plan for your ResearchCreating a Data Management Plan for your Research
Creating a Data Management Plan for your Research
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online
 
Data Fluency - AUA Conference
Data Fluency - AUA ConferenceData Fluency - AUA Conference
Data Fluency - AUA Conference
 
T14 sustainability - 3 keys to avoiding ig failures - keith atteck
T14   sustainability - 3 keys to avoiding ig failures - keith atteckT14   sustainability - 3 keys to avoiding ig failures - keith atteck
T14 sustainability - 3 keys to avoiding ig failures - keith atteck
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligence
 
Ws 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it homeWs 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it home
 
Course Outline - Managing Electronic Records in Corporate RIM Systems
Course Outline - Managing Electronic Records in Corporate RIM Systems Course Outline - Managing Electronic Records in Corporate RIM Systems
Course Outline - Managing Electronic Records in Corporate RIM Systems
 
Ariadne: Data Management Planning
Ariadne: Data Management PlanningAriadne: Data Management Planning
Ariadne: Data Management Planning
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
DC Salesforce1 Tour Data Governance Lunch Best Practices deck
DC Salesforce1 Tour Data Governance Lunch Best Practices deckDC Salesforce1 Tour Data Governance Lunch Best Practices deck
DC Salesforce1 Tour Data Governance Lunch Best Practices deck
 

More from Logikcull.com

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Logikcull.com
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleLogikcull.com
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull.com
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewLogikcull.com
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Logikcull.com
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastLogikcull.com
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastLogikcull.com
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy Logikcull.com
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataLogikcull.com
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantLogikcull.com
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastLogikcull.com
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 Logikcull.com
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesLogikcull.com
 

More from Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 

Recently uploaded

A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 

Recently uploaded (20)

A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 

Custodian Interviews - How to Leverage a Valuable Opportunity

  • 1. CUSTODIAN INTERVIEWS MAXIMIZING A VALUABLE OPPORTUNITY
  • 2. Join Today! aceds.org/join Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes Newsletter Affinity Partner Discounts “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3.
  • 4. SPEAKERS  Matthew Verga, J.D. – Director, Content Marketing and eDiscovery Strategy, Modus eDiscovery Inc. – Matthew Verga has spent the past eight years working in electronic discovery, four years as a practicing attorney with an AmLaw 100 firm and four years as a consultant with national electronic discovery service providers. Matthew has personally designed and managed many large scale electronic discovery efforts and has overseen the design and management of many more as both an attorney and a consultant. As a consultant, Matthew has counseled substantial companies and law firms at both the matter and the enterprise level. – As the Director of Content Marketing and eDiscovery Strategy for Modus eDiscovery Inc., Matthew is responsible both for enterprise-level consulting engagements and for the creation of articles, white papers, webinars and workshops in support of Modus’s thought leadership efforts.
  • 5. SPEAKERS  Gary Torgersen, CCE, EnCE – Manager of Forensic Services, Modus eDiscovery Inc. – A seasoned forensics expert, Gary Torgersen possesses more than 12 years experience in the eDiscovery and digital forensics industry. He stays on the cutting edge of technology to meet the needs of his clients, including creating custom collection processes and platforms and developing proprietary technology assisted review programs and workflows. – As Manager of Forensic Services for Modus eDiscovery, Gary oversees and manages the Modus Forensics and Collections department. Gary oversees and conducts data collections, performs computer forensic analysis, and provides reporting, in conjunction with clients and Modus Project Management and Data Management teams. Gary also testifies in court on behalf of clients, and is responsible for preparing affidavits and giving depositions.
  • 6. PROGRAM AGENDA  Why They Matter  Who to Interview  What to Ask  How to Document Answers  When to Leverage the Results  Key Takeaways  Questions and Answers
  • 8. WHY THEY MATTER  Three main reasons: – Satisfying preservation obligations – Gathering valuable discovery intelligence – Disseminating important litigation information  Satisfying preservation obligations – Custodians are key information sources – They know what exists – They know where it is or is likely to be
  • 9. WHY THEY MATTER, CONT.  Valuable discovery intelligence – Direct information regarding o Device usage o Software usage o File storage practices o Backup practices o Communication practices – Relative priority of people and sources – Likely content (form and substance) of sources
  • 10. WHY THEY MATTER, CONT.  Information dissemination – Disinformation and rumor common – Opportunity to directly disseminate details and answer questions – Opportunity to ensure hold understanding and compliance – Opportunity to get face to face with key individuals
  • 12. WHO TO INTERVIEW  In general, three buckets to be filled: – Key custodians – Representative custodians – Departmental custodians  Key custodians – Who they are – Why they matter – Priority
  • 13. WHO TO INTERVIEW, CONT.  Representative custodians – Who they are – Why they matter – When they are used  Departmental custodians – Who they are – Why they matter – How they differ
  • 15. WHAT TO ASK  Introduction to script concept  Script development process – Participants  Use of templates or previous scripts as starting point  Tailored to respondents
  • 16. WHAT TO ASK, CONT.  Who they are – Identity, role, and connections  What they do – Activities, materials used, and materials generated  How they do it – Paper, hardware, software, and other tools or systems
  • 17. WHAT TO ASK, CONT.  With whom they communicate – Internal and external, related to the matter, other suggestions  How they communicate – E-mail, text, voice, chat, paper, etc.  Whether they understand and will comply – Meaning of hold, meaning of interview, meaning of compliance
  • 18. WHAT TO ASK, CONT.  Device information – Computers, mobile devices, storage devices/media, etc.  Usage and practice information – Software tools, file formats, local/network/cloud storage, etc.  IT systems information – Backup practices, janitorial functions, search and retrieval options, etc.
  • 19. WHAT TO ASK, CONT.
  • 20. WHAT TO ASK, CONT.
  • 21. WHAT TO ASK, CONT.
  • 22. HOW TO DOCUMENT ANSWERS
  • 23. HOW TO DOCUMENT ANSWERS  Three main approaches: – Conversational interviews with manual recordation – Scripted interviews with formatted recordation – Automated “interviews” and recordation  Conversational interviews with manual recordation – Simplest and most traditional, one-on-one o Can be started quickly and with little cost and allows you to speak with every custodian o BUT, yields inconsistent notes that are less useful and is time consuming when custodians are numerous
  • 24. HOW TO DOCUMENT ANSWERS, CONT.  Scripted interviews with formatted recordation – Closely follow a detailed script – Record answers in a structured way to speed aggregation and enhance utility – Options include PDF forms, spreadsheets, and pre-formatted text documents o Yields more consistent, useful information, and multiple interviewers can conduct identical interviews o BUT requires more time and expense to start and is time consuming when custodians are numerous
  • 25. HOW TO DOCUMENT ANSWERS, CONT.  Automated “interviews” and recordation – No one-on-one interviews (at least initially) – Electronic questionnaires or web-based surveys o Easily scales to accommodate numerous custodians, produces consistent, easily- used information, and custodians can be asked to sign and certify their answers o BUT requires the most time and expense to start and there are none of the peripheral benefits from speaking to all of the custodians
  • 26. HOW TO DOCUMENT ANSWERS, CONT.
  • 27. HOW TO DOCUMENT ANSWERS, CONT.
  • 28. HOW TO DOCUMENT ANSWERS, CONT.
  • 29. HOW TO DOCUMENT ANSWERS, CONT.
  • 30. WHEN TO LEVERAGE THE RESULTS
  • 31. WHEN TO LEVERAGE THE RESULTS  Validation of preservation – Confirm assumptions made about the appropriate scope of preservation (i.e., what individuals, departments, and systems to include) or to adjust that scope, if needed – Confirm that all relevant individuals have understood, are complying with, and will continue to comply with the preservation requirements – Confirm that all relevant automated janitorial functions or back-up media recycling have been identified and suspended
  • 32. WHEN TO LEVERAGE THE RESULTS, CONT.  Prioritization and organization of collection and processing – Sources most likely to contain relevant data or documents can be identified and prioritized ahead of all other sources. – Sources unlikely to contain relevant data or documents can be identified and excluded from collection and processing. – The quantity and diversity of sources requiring collection and processing can be determined and leveraged to inform decisions regarding collection methodologies.
  • 33. WHEN TO LEVERAGE THE RESULTS, CONT.  Prioritization and customization of review – The data and documents from the sources most likely to contain relevant materials can be identified and prioritized ahead of the data and documents from all other sources. – Qualitative information from the custodians about the relevant materials can be provided to the reviewers to enhance the quality and efficiency of their review. – Advance knowledge of privilege prevalence (and other content attributes) can be used to inform better decisions about who should review a particular set of materials and how they should be reviewed.
  • 35. KEY TAKEAWAYS  WHY – Preservation obligations – Discovery intelligence – Information dissemination  WHO – Key custodians – Representative custodians – Departmental custodians  WHAT – Identity – Activities – Communications – Compliance  HOW – Conversational – Scripted – Automated  WHEN – Preservation – Collection – Review
  • 36. Q / A

Editor's Notes

  1. Hello and welcome to this ACEDS webcast, Custodian Interviews – Maximizing a Valuable Opportunity, presented by Modus. I`m your host Robert Hilson of ACEDS and I`m joined today by two great presenters who I will introduce in a moment. I do first have a couple of announcements.
  2. I’d like to especially welcome everyone who is new to the ACEDS. ACEDS is a membership association owned and managed by Barbri that is committed to promoting e-discovery skill and competence through training, education, and networking. We offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners.
  3. We will be holding our annual conference September 29 to 30 at the Gaylord National Resort in Washington, DC. A live certification prep course will precede the conference on the 28th. And we expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Earlier this month, we announced that retired US magistrate Judge Nan Nolan, who is now at JAMS, will be presenting, as well as Jeff Jacobson, the Director of the New Jersey Division of Law. They will join Judge Grimm, Judge Waxse and Judge Thomas Vanaskie among others. You can visit ediscoveryconference.com and learn more about the program and the topics we`ll cover, and if you feel so inclined, you can register to attend.
  4. Alright, let`s get started. One of our speakers today is Matthew Verga, who has presented to you before and has spoken at the ACEDS Conference. He is the Director of eDiscovery Strategy at Modus where he is responsible for consulting enterprise-level clients and also heads Modus` thought leadership efforts. He also spent four years as a practicing attorney with an AmLaw 100 firm, where he personally designed and managed many large scale e-discovery efforts. Matthew, thanks a lot for being here.
  5. Joining Matthew is Gary Torgersen, manager of forensic services for Modus. Gary is a seasoned forensic expert who possesses more than 12 years experience in the eDiscovery and digital forensics professions. At Modus, he oversees and manages the forensics and collections departments, and provides reporting to clients working together with Modus` Project Management and Data Management teams. He also testifies in court on behalf of clients, and is responsible for preparing affidavits and giving depositions. Gary, thanks for being here. Okay, I am going to turn it over to these guys. I do want to encourage everyone on the call to ask questions. We will field them throughout the course of the presentation if time allows. Gentlemen, thanks again for being here. I will turn it over to you.