The document discusses data minimization techniques for reducing costs in electronic discovery. It outlines 5 steps to data minimization including filtering by file type and date, removing system/program files, deduplication, keyword filtering, and advanced analytics. The document also notes that utilizing these strategies can reduce collected data volumes by 40-80%, allowing cases to be assessed virtually as soon as data is collected and lowering processing costs. It promotes the use of transparent search technologies to ensure discovery searches are defensible.
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
Early Case Assessment provides the framework for litigators to identify and analyze electronically stored information in response to a litigation hold and.or discovery request.
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
Every lawyer needs eDiscovery. Do you do it right?
Learn how to navigate dramatically increasing amounts of electronic data in this free Clio webinar.
How does your firm handle eDiscovery? In litigation and government investigations, eDiscovery is the process by which information is exchanged electronically—and it’s becoming more and more common.
Unlike traditional information stored in paper form, electronic information is much more pervasive, long-lasting, and transient. During a discovery disclosure, you will get mountains of data that needs to be sorted and analyzed. In this webinar, we’ll talk about the principles of eDiscovery and how your can ensure that your practice can properly preserve and sort information efficiently.
Join Nextpoint CEO Rakesh Madhava and Clio’s own Joshua Lenon as we walk you through:
- the basics of eDiscovery
- which tools your firm should use to acquire and preserve information
- how to quickly find the nuggets of data your case needs
- how to integrate eDiscovery better into your practice
Even with the growing importance of eDiscovery, most law firms still aren’t prepared to handle large amounts of digital information. Make sure that yours isn’t one of them.
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
Early Case Assessment provides the framework for litigators to identify and analyze electronically stored information in response to a litigation hold and.or discovery request.
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
Every lawyer needs eDiscovery. Do you do it right?
Learn how to navigate dramatically increasing amounts of electronic data in this free Clio webinar.
How does your firm handle eDiscovery? In litigation and government investigations, eDiscovery is the process by which information is exchanged electronically—and it’s becoming more and more common.
Unlike traditional information stored in paper form, electronic information is much more pervasive, long-lasting, and transient. During a discovery disclosure, you will get mountains of data that needs to be sorted and analyzed. In this webinar, we’ll talk about the principles of eDiscovery and how your can ensure that your practice can properly preserve and sort information efficiently.
Join Nextpoint CEO Rakesh Madhava and Clio’s own Joshua Lenon as we walk you through:
- the basics of eDiscovery
- which tools your firm should use to acquire and preserve information
- how to quickly find the nuggets of data your case needs
- how to integrate eDiscovery better into your practice
Even with the growing importance of eDiscovery, most law firms still aren’t prepared to handle large amounts of digital information. Make sure that yours isn’t one of them.
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Zapproved
The spotlight has turned to the issue of proportionality as it may be applied to the preservation of potentially relevant information. The postPension Committee world has moved beyond asking “if” litigants need to preserve information to a focus on “how.”
One need look no further than the testimony before the Dallas mini-conference in September and followed shortly thereafter by the debate stirred by the Pippins v. KPMG opinion.
Litigants are struggling to balance the increasing demands of preservation being driven by the exponential increase in electronically stored information (ESI) and the perceived rise in sanctions for spoliation. In order to control the increasing cost and “monumental inefficiency” that can result from traditional approaches to data preservation, the stakeholders in the U.S. legal system are searching for a solution founded on the principles of both reasonableness and proportionality as embodied in the Federal Rules of Civil Procedure.
The goal of this paper is to explore options for providing more objective “guideposts” for litigants facing the uncertainty of future discovery demands.
This presentation looks at issues surrounding the licensing of research data for reuse. It outlines the concepts behind data licensing, looks at data reuse licenses used by CESSDA data archives, considers the role of Creative Commons and Open Data Licenses in sharing social science research data, and highlights some of the problems, issues, and challenges facing archives and repositories.
With hundreds of terabytes of e-mail, file shares, and other applications, corporations face the potential loss of critical intellectual property, trade secrets, and confidential information when outsourcing identification, collection, culling, early-case assessment, and first-pass review. Outsourcing is no longer an option from both a cost and risk perspective.
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Zapproved
The spotlight has turned to the issue of proportionality as it may be applied to the preservation of potentially relevant information. The postPension Committee world has moved beyond asking “if” litigants need to preserve information to a focus on “how.”
One need look no further than the testimony before the Dallas mini-conference in September and followed shortly thereafter by the debate stirred by the Pippins v. KPMG opinion.
Litigants are struggling to balance the increasing demands of preservation being driven by the exponential increase in electronically stored information (ESI) and the perceived rise in sanctions for spoliation. In order to control the increasing cost and “monumental inefficiency” that can result from traditional approaches to data preservation, the stakeholders in the U.S. legal system are searching for a solution founded on the principles of both reasonableness and proportionality as embodied in the Federal Rules of Civil Procedure.
The goal of this paper is to explore options for providing more objective “guideposts” for litigants facing the uncertainty of future discovery demands.
This presentation looks at issues surrounding the licensing of research data for reuse. It outlines the concepts behind data licensing, looks at data reuse licenses used by CESSDA data archives, considers the role of Creative Commons and Open Data Licenses in sharing social science research data, and highlights some of the problems, issues, and challenges facing archives and repositories.
With hundreds of terabytes of e-mail, file shares, and other applications, corporations face the potential loss of critical intellectual property, trade secrets, and confidential information when outsourcing identification, collection, culling, early-case assessment, and first-pass review. Outsourcing is no longer an option from both a cost and risk perspective.
Presentation made in one of my academic class, Based on a book from Baron, Robert A., Nyla Branscombe. Social Psychology, 13th Edition. Pearson Learning Solutions, 09/2011.
February 2010 8 Things You Cant Afford To Ignore About eDiscoveryJohn Wang
8 Things You Can't Afford to Ignore About eDiscovery. Unstructured content is growing at an unprecedented rate, reaching 650% over five years, with Fortune 1000 companies managing petabytes of data. With electronically stored information (ESI) being formally covered under the Federal Rules of Civil Procedure (FRCP), organizations need new tools to effectively manage, analyze, and review ESI. This article presents 8 techniques and technologies that can be used to lower costs and improve litigation success.
Andy Teichholz, a Senior Discovery Consultant at Daegis, delivered a presentation at the Society of Corporate Compliance and Ethics' ("SCCE") conference on Nov. 10 in San Francisco titled Effective Internal Investigations. Andy spoke on eDiscovery and computer forensics processes and concepts in an investigative context. His presentation identified preliminary investigative considerations and requirements for data preservation and collection.
Surviving Technology 2009 & The ParalegalAubrey Owens
Talking technology with Paralegal Studies Students at J. Sargent Reynolds Community College on February 25, 2009. Using Software as a Solution for information mangament through trial presentation.
With 100s of terabytes of email, file shares and other applications, corporation face the potential loss of critical intellectual property, trade secrets and confidential information when outsourcing identification, collection, culling, early case assessment and first pass review. Outsourcing all is no longer an option from both a cost and risk perspective. In this session, attendees will learn the the types of ESI that must be produced for discovery, as well as how in-house eDiscovery practices can reduce collection and review costs, and minimize information leakage.
10 Differences Between eDiscovery & Information GovernanceEliseT2015
This presentation will outline ten key differences between eDiscovery and Information Governance, and why tools and techniques for one often fail with the other.
Spreadmart To Data Mart BISIG PresentationDan English
Presentation at the North Central BI Special Interest Group (BISIG) going over a case study of converting an Excel Spreadmart solution to a SSAS data mart solution
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
2. About Kevin
• With Encore since January 2008 and based in
Washington, DC, as Regional Sales Director, Kevin is
responsible for managing sales team and business
development activities throughout the Eastern Region.
• Kevin has 20 years of experience in the management
services & e-Discovery industries.
• He has worked with many of the leading Am Law 200 firms
& Fortune 500 companies.
• He previously worked for Xerox, Pitney Bowes, IKON Office
Solutions and Capital Legal Solutions.
• Kevin holds a B.S. in Public Administration from Eastern
Michigan University.
• He is a board member of the Cystic Fibrosis Foundation.
2
3. About Encore
• Recognized as a Top 10 eDiscovery Service Provider in the 2007
and 2008 Socha-Gelbmann Survey.
• Web Repository hosts over 3,000 active databases exceeding 140
TB of data.
• Largest Channel Partner for Concordance, iConect and soon
Clearwell.
• In-depth experience working with law firms, corporations and
most federal government agencies.
• Technology agnostic approach to meeting our clients needs.
• Only National eDiscovery Services Provider to establish a
dedicated Subprime Services Unit addressing the specific needs of
companies and corporations impacted by the mortgage and credit
crisis.
4. Encore Discovery Solutions
National Coverage with Local Support
Washington DC
New Jersey
Chicago
Los Angeles
Newport Beach
San Francisco Bay Area
Portland
Denver
Austin
Houston
San Antonio
Phoenix:
• Company Headquarters
• NOC (National Operations Center)
• SAS-70 Certified Data Center
6. Fact: ESI Spending
In 2009, In House Legal Counsel will spend on
average $500,000 annually on:
1. ESI Planning
2. Practice Management
3. Electronic Discovery
* Fulbright & Jaworski 2008 Litigation Trends Survey
6
7. Fact:
What Areas Concern You Most?
According to a recent survey conducted on 325
representatives, the two leading areas of
concern for in-house counsel in 2009 are:
Cost Management
Electronic Discovery
* Fulbright & Jaworski 2008 Litigation Trends Survey
7
9. Significant Decisions For EDiscovery
Victor Stanley Inc. v. Creative Pipe Inc.
On May 29, 2008, the U.S. District Court for the District of Maryland issued a
lengthy and noteworthy ruling regarding the discovery of “electronically stored
information” or “ESI.” The court held that the defendants waived the attorney-
client privilege and work-product doctrine with respect to 165 separate
documents.
The case is particularly instructive because it describes in detail the multiple
steps that a litigant should take in order to:
(1) protect against the inadvertent disclosure of privileged ESI;
(2) preserve the privileged status of ESI in the event that it is inadvertently
disclosed; and
(3) defend the methodology used to search for relevant ESI.
11. The Collaborative Search Approach
• The parties, presumably as part of the
meet and confer process must “confer
with their opposing party in an effort to
identify a mutually agreeable search and
retrieval method.
This minimizes cost because if the
method is approved, there will be no
dispute resolving its sufficiency, and
doing it right the first time is always
cheaper than doing it over if ordered to
do so by the court.”
11
12. E-Discovery Best Practices
Best Practices & Data Driven Search Approach: In order to have a
•
defensible methodology in the absence of collaboration a party needs to:
– “be aware of literature describing the strengths and
weaknesses of various methodologies, such as The Sedona
Conference Best Practices ,…. and select the one that they
believe is most appropriate for its intended task.”
– And, if their selection is challenged, then they should expect to
support their position with “affidavits or other equivalent
information from persons with the requisite qualifications and
experience, based on sufficient facts or data and using reliable
principles or methodology.”
– Finally, they should do appropriate levels of data sampling and
quality assurance to test core search assumptions.
12
13. Taming The E-Discovery Beast
Enterprise EDD costs are skyrocketing and the need to rein them
in is a top concern
The $6M example: Fannie Mae Sec. Litig., 552 F.3d 814 (D.C. Cir.
2009)
● 400 search terms – resulting in hits on over 80% of the emails
● 600,000 documents reviewed with 50 contract attorneys
● And, the non-party (Office of Federal Housing Enterprise Oversight) was
still held in contempt
13
14. Approaches to Reducing Enterprise E-
Discovery Costs
1. Control information propagation
2. Delete/destroy when possible
3. Review cheaper: utilize contract/off-shore review
attorneys
4. Review faster: utilize advanced review technologies
5. Review less: utilize defensible data reduction
technologies
6. Perform early case assessments
7. Bring more processing, analysis & review in-house
14
15. Facts: Data Minimization Strategies
Utilizing data minimization strategies and solutions lowers e-discovery
processing costs by reducing the volume of data to be examined during each
phase of the discovery process.
In large, document-intensive cases, a 40% to 80% data reduction can be
achieved, allowing counsel to receive data in a fraction of the time traditionally
required.
This process makes collected data available for pre-case assessment and
analysis virtually as soon as it has been gathered.
16. Forensic Collection & Analysis
Targeting The Custodial Population
Targeted
Custodians
Outside Vendors
& Consultants
Admin. Asst. &
Other Executives
Staff & Clerical
Personnel
16
17. Forensic Collection & Analysis
Collection Methods Cost Risk
Self collection by corporate/internal IT staff
MODERATE
Vendor collection of ESI making a copy
HIGH
Vendor collection of forensic image of all relevant
custodian units and servers
Vendor collection of ESI forensically imaging
MODERATE
targeted files
17
18. Best Practices: 5 Steps To Data Minimization
I.
• What file types are included?
Collected ESI III.
• File Type List Analysis
• What if file name is changed?
• File Signature Analysis
• Duplicates removed or
suppressed?
• Attachments versus loose files
Filter by File Type
IV. • How about forwarded emails
Filter by Date
•Black box versus Interactive
•Knowing the data
augments knowing the issues
System and Program File •Stemming
•Zip files, embedded files, etc.
Removal (De-NIST)
Smart De-duplication
Keyword Filtering
V.
II. Advanced Analytics
•Know data before processing
•Email threads
• Remove known program files
•Domain filtering
• NIST list
•Participant analysis & filtering
• Extensions for proprietary •Conversations
software •Topics
19. Traditional Approach to E-Discovery Presents
Three Significant Challenges
1. Is early case assessment really EARLY?
2. Does blind culling result in TOO MUCH DATA?
3. Are your search results DEFENSIBLE?
20. Clearwell Reduces Cost, Time and Risk of E-
Discovery
Rapid Processing
Case
• 3-5X faster processing
Documents
• Comprehensive de-duplication across all case documents
• Automated processing, eliminating manual effort
Client Machines
Search, Cull-Down & Early Case Assessment
• Superior culling and filtering (by domain, sender, recip.)
• Advanced analysis by discussion threads, topics, groups
• Defensible search: sampling, testing and iterative refinement
Email Servers
First Pass Review
• Rapid reviewing, tagging and exporting
• Productivity tracking and reporting
Files/Servers
• Pre-built integration with review platforms
Time
Archives
20
21. Enterprise Search Technology is a “Black-Box”, Inhibiting
Defensibility of E-Discovery Search
2TB
Collected
??
Client Machines
1.2TB
For Review
Email Servers
• No visibility into how or why the
results were produced
De-Duplication
• Refining searches takes days
Keyword
• Difficult to Range
Date document the search
Files Servers
refinement process
Custodian
• Keyword searches can be over or
under inclusive
Archives
22. E-Discovery Search Needs to Become More
Transparent
2TB
Collected
• Provide visibility into how
results are produced
• Reduce over and under- 200GB
inclusiveness For Review
• Speed up search testing and
refinement
• Automate documentation
22
23. Our eDiscovery Volume Reduction Calculator is available at:
www.EncoreDiscovery.com/EVRC
This tool can help you determine how data minimization can reduce your
discovery costs and shorten your electronic discovery processing time.
Thank you for joining us
Kevin P. Nugent
Regional Sales Director
202.445.9343
knugent@encorediscovery.com