SlideShare a Scribd company logo
Surviving Technology 2009: EDRM & The Paralegal
Paralegal
Paralegals provide invaluable aid to attorneys in the litigation process. Litigation paralegals are the backbone of the trial team,
coordinating the thousands of details that must be accomplished before, during and after trial.

One of a paralegal’s most important tasks is helping lawyers prepare for closings, hearings, trials, and corporate meetings.
Paralegals might investigate the facts of cases and ensure that all relevant information is considered. They also identify
appropriate laws, judicial decisions, legal articles, and other materials that are relevant to assigned cases. After they analyze
and organize the information, paralegals may prepare written reports that attorneys use in determining how cases should be
handled. If attorneys decide to file lawsuits on behalf of clients, paralegals may help prepare the legal arguments, draft
pleadings and motions to be filed with the court, obtain affidavits, and assist attorneys during trials. Paralegals also organize
and track files of all important case documents and make them available and easily accessible to attorneys.

Information Management
The collection and management of information from one or more sources and the distribution of that information to one or
more audiences. This sometimes involves those who have a stake in, or a right to that information. Management means the
organization of and control over the structure, processing and delivery of information.

Getting your electronic house in order to mitigate risk & expenses should electronic discovery become an issue, from initial
creation of electronically stored information through its final disposition.

Sources of Discoverable Information:
   1. Readily Accessible – maintained in the normal course of business
            a. Paper Records
            b. Electronic Records
                     i. Graphic / Image Files
                    ii. Audio / Video
                   iii. Emails
                   iv. Chat Logs
                    v. Cell Phones
   2. Inaccessible or Requires Forensics
            a. Archived Tape Data
            b. Deleted Data

Governance of Discovery:
   1. Federal Rules of Civil Procedure
   2. State & Circuit Courts
   3. Regulatory Agencies (Internal Investigations)
   4. Congressional Acts (GLBA , HIPAA, PCI DSS, Sarbanes-Oxley Act, etc)

Categorization of Information:
    1. Responsive
    2. Privilege
    3. Non-Responsive
Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.
Electronic Discovery Reference Model:
EDRM develops guidelines and standards for e-discovery consumers and providers. From the original model to the 2008-2009
projects, EDRM has helped e-discovery consumers and providers reduce the cost, time and manual work associated with e-
discovery.




Identification: Locating potential sources of ESI & determining its scope, breadth & depth.

Preservation: Ensuring that ESI is protected against inappropriate alteration or destruction.

Collection: Gathering ESI for further use in the electronic discovery process (processing, review, etc.)

Processing: Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review & analysis.

Review: Evaluating ESI for relevance & privilege.

Analysis: Evaluating ESI for content & context, including key patterns, topics, people & discussion.

Production: Delivering ESI to others in appropriate forms & using appropriate delivery mechanisms.

Presentation: Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native & near-native forms.




Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.
Litigation Readiness Technology…Software as a Service (Solution):
The most common challenge facing litigants is how to effectively and efficiently identify potentially responsive documents with
accuracy. No longer is it just as simple as skimming across 10 boxes of paper docs containing 25,000 sheets in less than 8 hours.
Today, litigants need to review 10GB of eDocs which is the equivalent to thousands of electronic files. That equates to more
than 650,000 sheets of paper. It would take more than 208 hours to manually review (8 days for 2 case clerks to sift through
just to pass up the chain for 2nd and 3rd reviews).

Search and Retrieval technology has provided the means for litigants to identify relevant data with a sense of accuracy and
confidence. Keyword searching is the most common format used to cull data in an effort to narrow the scope of documents
deemed relevant for review. Keywords are created and agreed upon by all parties based on the scope of the case as well as
intelligence gained during meet and confer conferences.

Conceptual searching provides litigants with the ability to use taxonomies to create categories of documents based on terms of
similar meaning based on documents identified as relevant from keyword search results. Conceptual searching is designed to
further narrow the scope with potentially relevant document strings based on content and other like factors. Concept
searching is gaining popularity in eDiscovery review protocols, for when used properly, the identification of quot;Hot Docsquot;
becomes less of a burden.

Using the proper search and retrieval solution is critical to wading through the sea of eDocs as it relates to time and money.

SaaS and The Stages of Discovery
Identification using Early Case Assessment Models:
    • Road map of discoverable sources for both Paper and Electronic
    • Develop case budgets
    • Develop case strategy

Preservation & Collection of Data:
    • Limited by the scope of Discovery. See FRCP Rule 26(f)
    • Document Sweeps
    • Electronically Stored Information
    • Chain of Custody

Processing, Review and Analysis:
    • De-duplication
    • Culling via Keyword Term & Conceptual Searching
    • Native File Review
    • Localized and Hosted document repositories

Production:
   • Agreed upon format between Parties. See FRCP Rule 26(f)
   • Paper and/or Electronic
   • Metadata
   • Deliverable Media




Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.

More Related Content

What's hot

Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
Louise Spiteri
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
Soumen Debgupta
 
E discovery keynote
E discovery keynoteE discovery keynote
E discovery keynote
David Harvey
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
Mehedi Hasan
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
Nuix
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Ronak Karanpuria
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery Disputes
David Harvey
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Pankaj Choudhary
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
J. David Morris
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
Ronald Coleman
 
Information security questions
Information security questions Information security questions
Information security questions
gamemaker762
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
Costas Katsavounidis
 

What's hot (20)

Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
E discovery keynote
E discovery keynoteE discovery keynote
E discovery keynote
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery Disputes
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Information security questions
Information security questions Information security questions
Information security questions
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 

Similar to Surviving Technology 2009 & The Paralegal

Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
Kevin Featherly
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
CallPM
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
Aubrey Owens
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
Centre for Advanced Management Education
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
Aubrey Owens
 
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
kecurrey
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Rob Robinson
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
pabrown1219
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
Darren Gallagher
 
ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation
Robbie Hilson
 
eDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law FirmeDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law Firm
Clio - Cloud-Based Legal Technology
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI Planning
John Jablonski
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
Teja Bheemanapally
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Johnson Ubah
 
eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011
eamonnsfl
 
AZ to eDiscovery
AZ to eDiscoveryAZ to eDiscovery
AZ to eDiscovery
eamonnsfl
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
CSCJournals
 
Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610
dparalegal
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
mckerliejonelle
 

Similar to Surviving Technology 2009 & The Paralegal (20)

Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
 
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009Orange Legal Technologies   Time, Risk, And Cost In E Discovery 021009
Orange Legal Technologies Time, Risk, And Cost In E Discovery 021009
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
 
ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation
 
eDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law FirmeDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law Firm
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI Planning
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011
 
AZ to eDiscovery
AZ to eDiscoveryAZ to eDiscovery
AZ to eDiscovery
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Surviving Technology 2009 & The Paralegal

  • 1. Surviving Technology 2009: EDRM & The Paralegal Paralegal Paralegals provide invaluable aid to attorneys in the litigation process. Litigation paralegals are the backbone of the trial team, coordinating the thousands of details that must be accomplished before, during and after trial. One of a paralegal’s most important tasks is helping lawyers prepare for closings, hearings, trials, and corporate meetings. Paralegals might investigate the facts of cases and ensure that all relevant information is considered. They also identify appropriate laws, judicial decisions, legal articles, and other materials that are relevant to assigned cases. After they analyze and organize the information, paralegals may prepare written reports that attorneys use in determining how cases should be handled. If attorneys decide to file lawsuits on behalf of clients, paralegals may help prepare the legal arguments, draft pleadings and motions to be filed with the court, obtain affidavits, and assist attorneys during trials. Paralegals also organize and track files of all important case documents and make them available and easily accessible to attorneys. Information Management The collection and management of information from one or more sources and the distribution of that information to one or more audiences. This sometimes involves those who have a stake in, or a right to that information. Management means the organization of and control over the structure, processing and delivery of information. Getting your electronic house in order to mitigate risk & expenses should electronic discovery become an issue, from initial creation of electronically stored information through its final disposition. Sources of Discoverable Information: 1. Readily Accessible – maintained in the normal course of business a. Paper Records b. Electronic Records i. Graphic / Image Files ii. Audio / Video iii. Emails iv. Chat Logs v. Cell Phones 2. Inaccessible or Requires Forensics a. Archived Tape Data b. Deleted Data Governance of Discovery: 1. Federal Rules of Civil Procedure 2. State & Circuit Courts 3. Regulatory Agencies (Internal Investigations) 4. Congressional Acts (GLBA , HIPAA, PCI DSS, Sarbanes-Oxley Act, etc) Categorization of Information: 1. Responsive 2. Privilege 3. Non-Responsive Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.
  • 2. Electronic Discovery Reference Model: EDRM develops guidelines and standards for e-discovery consumers and providers. From the original model to the 2008-2009 projects, EDRM has helped e-discovery consumers and providers reduce the cost, time and manual work associated with e- discovery. Identification: Locating potential sources of ESI & determining its scope, breadth & depth. Preservation: Ensuring that ESI is protected against inappropriate alteration or destruction. Collection: Gathering ESI for further use in the electronic discovery process (processing, review, etc.) Processing: Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review & analysis. Review: Evaluating ESI for relevance & privilege. Analysis: Evaluating ESI for content & context, including key patterns, topics, people & discussion. Production: Delivering ESI to others in appropriate forms & using appropriate delivery mechanisms. Presentation: Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native & near-native forms. Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.
  • 3. Litigation Readiness Technology…Software as a Service (Solution): The most common challenge facing litigants is how to effectively and efficiently identify potentially responsive documents with accuracy. No longer is it just as simple as skimming across 10 boxes of paper docs containing 25,000 sheets in less than 8 hours. Today, litigants need to review 10GB of eDocs which is the equivalent to thousands of electronic files. That equates to more than 650,000 sheets of paper. It would take more than 208 hours to manually review (8 days for 2 case clerks to sift through just to pass up the chain for 2nd and 3rd reviews). Search and Retrieval technology has provided the means for litigants to identify relevant data with a sense of accuracy and confidence. Keyword searching is the most common format used to cull data in an effort to narrow the scope of documents deemed relevant for review. Keywords are created and agreed upon by all parties based on the scope of the case as well as intelligence gained during meet and confer conferences. Conceptual searching provides litigants with the ability to use taxonomies to create categories of documents based on terms of similar meaning based on documents identified as relevant from keyword search results. Conceptual searching is designed to further narrow the scope with potentially relevant document strings based on content and other like factors. Concept searching is gaining popularity in eDiscovery review protocols, for when used properly, the identification of quot;Hot Docsquot; becomes less of a burden. Using the proper search and retrieval solution is critical to wading through the sea of eDocs as it relates to time and money. SaaS and The Stages of Discovery Identification using Early Case Assessment Models: • Road map of discoverable sources for both Paper and Electronic • Develop case budgets • Develop case strategy Preservation & Collection of Data: • Limited by the scope of Discovery. See FRCP Rule 26(f) • Document Sweeps • Electronically Stored Information • Chain of Custody Processing, Review and Analysis: • De-duplication • Culling via Keyword Term & Conceptual Searching • Native File Review • Localized and Hosted document repositories Production: • Agreed upon format between Parties. See FRCP Rule 26(f) • Paper and/or Electronic • Metadata • Deliverable Media Prepared by Aubrey Owens, Superior Document Services, for educational purposes only. Presented February 25, 2009 to the Paralegal Studies Program at JSRCC.