SlideShare a Scribd company logo
1 of 31
1
UNDERSTANDING THE VALUE OF DATABASE DISCOVERY
BEYOND UNSTRUCTURED DATA
2
Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum… to train, network and stay
current on critical information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
3
4
PRESENTERS
Stephanie L. Giammarco sits on BDO’s Board of Directors and leads
BDO’s Forensic Technology Services practice with more than 20
years of experience and a background in accounting, information
technology and criminology. Having worked on some of the largest
financial frauds to date, she has led teams creating databases of
millions of records, performed advanced data analytics and provided
testimony pertaining to damages and electronically stored
information.
Stephanie provides litigation and consulting services to organizations
and their counsel, including data analytics, computer forensics and
e-discovery services related to domestic and international matters
involving product liability, financial statement fraud, class action
lawsuits, internal investigations, securities fraud, employee and
vendor schemes, and breach of contract. She is skilled in the
collection, preservation and analysis of electronic evidence, as well
as the implementation of various e-discovery tools.
She has been deposed as a Rule 30(b)6 e-discovery witness and
testified before the Judicial Arbitration Services on the calculation
of damages in contract disputes. Stephanie has published and
presented on a range of computer forensics and e-discovery topics,
including before the Securities and Exchange Commission, Security
Industry Authority and National Futures Association.
Chris J. Lopata is of counsel at Jones Day in New York. His practice
focuses on complex and general civil litigation, including product
liability, toxic torts, credit reporting, and a wide range of business
litigation.
Chris is a member of the firm's e-Discovery Committee and serves as the
New York office coordinator for e-discovery issues. Chris has led
discovery teams in numerous joint defense groups. He has extensive
experience coordinating affirmative and defensive e-discovery efforts on
behalf of clients.
Chris' practice extends beyond pretrial e-discovery. He has served as lead
trial counsel in a variety of commercial disputes in New York State
courts. He also has counseled clients who have sought and obtained
favorable settlements in non-trial bound business disputes.
The views set forth herein are the personal views of the author and do
not necessarily reflect those of the law firm with which he is associated.
Stephanie L. Giammarco, CPA/CITP, CFE, CEDS
Partner, BDO Consulting
sgiammarco@bdo.com
Direct: 212-885-7439
Christopher J. Lopata
Of Counsel, Jones Day
cjlopata@jonesday.com
Direct: 212-326-3602
5
OUR AGENDA
1. A quick poll of the audience…
2. Structured v. unstructured data
3. Some necessary definitions
4. Examples of database-driven applications
5. The database schema and data dictionary
6. Theories of database discovery
7. Database discovery: methods for “pulling” data for review and
production
8. Practice pointers
6
A Quick Poll…
… on Database Discovery
7
A QUICK POLL…
Who knows what a database is?
A fancy Excel spreadsheet. A collection of rows and columns, each populated with a value.
Who has used a database as part of their personal or work activities?
All of you have…Google & Lexus for research. Your time-keeping system, Concordance, Summation,
and Relativity, are all databases. Your company’s email system is effectively a database.
Who has had to conduct discovery from a database (or database-driven application)?
Sales and Marketing (CRM), Human Resources (HRIS), and GL/Inventory (ERP). SAP, and Hyperion
are perfect examples.
Bonus Question: Who can tell me what a relational database is?
A bunch of Excel spreadsheets (tables) linked together by a common key…
8
DEFINITIONS
Unstructured v. Structured Data
The Table
The Relational Database
9
DEFINITIONS| UNSTRUCTURED V. STRUCTURED DATA
Unstructured Data
 Wikipedia definition: Unstructured Data (or unstructured information) refers to
information that does not have a pre-defined data model. Unstructured information is
typically text-heavy, but may contain data such as dates, numbers, and facts as well.
 Translation: MS office files, loose files, most of the information that you can see via
Windows Explorer.
Structured Data
 Definition: Structured Data is information that resides in fixed fields within a record
or file, or is information that is organized into rows and columns, with pre-set
characteristics.
 Translation: Multiple tables, containing rows and columns which relate to each other
via common key.
10
DEFINITIONS| THE TABLE (THE CORE OF THE DATABASE)
 Records, not files…
 Rows v. columns
 Tables maintain the relationship
between columns
 A field is another way of saying column
 Data values, in the context of rows,
columns and tables, is the substance
 Real-time, constantly changing
information
 Data dictionary
 Schema
11
DEFINITIONS| THE RELATIONAL DATABASE
 Some databases only have one table
(flat file systems) and are no different
than a Microsoft Excel spreadsheet (very
rare).
 Relational databases, which are much
more common, have multiple tables,
each with a key that “links” them
together.
 How can relational databases be more
challenging to handle than flat file
systems in the context of discovery?
 Why do we use databases?
12
DATABASES
Database-Driven Applications
The Schema
The Data Dictionary
13
DATABASES| DATABASE-DRIVEN APPLICATIONS
A database, when combined with a user interface is often called a database-driven
application.
 Enterprise Resource Planning (ERP)
 Data Warehouses & Business Intelligence Systems
 Human Resource Information System (HRIS)
 Customer Relationship Management (CRM)
 Adverse Effects Systems
 SharePoint
 Email Archiving Systems
 kCura Relativity
DATABASES ARE ALL AROUND US AND WE WORK WITH THEM EVERY DAY.
14
DATABASES| THE SCHEMA
The database schema is the key to understanding:
 What tables of data exist within the relational database.
 The name assigned to each column within each table.
 How the columns are grouped together in each table.
 How the tables relate to each other.
15
DATABASES| THE DATA DICTIONARY
 Within the STUDENTS table, there are two columns of information.
– The STUDENT column contains the name of the student enrolled in the university
– The ID column is the unique identification number assigned to each student
 Within the ACTIVITIES table, there are four columns of
information.
– The ID column is the unique identification number assigned to each
student
– The ACTIVITY1 column contains the name of the activity they are
registered for
– The COST1 column contains the fee paid to the school for the activity
– The ACTIVITY2 column represents the secondary (if any) activity that
the student is registered for
– The COST2 column contains the fee paid to the school for the
secondary activity
 The ID field is the primary key between the STUDENTS and ACTIVITIES tables.
16
DATABASE DISCOVERY
Reports, Data, Trends
17
DATABASE DISCOVERY
Theory #1 – Reports are all that matter...
18
DATABASE DISCOVERY
Theory #2 – Data is all that matters...
 Databases are huge, historical repositories of “activity”
– Information inserted into a CRM system by an sales person, recording customer wins and losses,
potential new business opportunities, or even other uses for a medication he or she is selling
(Pharmaceutical Sales).
– The price point for a specific medication inserted into a POS system, and the entity that is
paying for it (Medicare Fraud).
– A history of consistent payments to a “false” or “suspicious” entity in the general ledger
(within the ERP system) (FCPA).
 The best way to identify trends is to pull large amounts of data into a usable format -
sort, filter, and investigate.
19
DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD
Just get the data out. Common in DOJ and FTC requests for data. Also used to provide
raw data to experts for analysis.
Sample DOJ Database Request
1. Identify each electronic or other database or data set used or maintained by the company at any
time after January 1, 2009, without regard to custodian, that contains information concerning the
company’s (a) products and product codes; (b) facilities; (c) production; (d) shipments; (e) sales;
(f) prices; (g) margins; (h) costs, including but not limited to production costs, distribution costs,
research and development costs, storage costs, standard costs, expected costs, and opportunity
costs; (i) patents or other intellectual property; (j) research or development projects; or (k)
customers, to the extent such customer information is not provided in response to specifications 9
and 10. For each such database, identify (i) the database type, i.e., flat, relational, or
enterprise; (ii) the size in both number of records and bytes of information; (iii) the fields,
query forms, and reports available or maintained; and (iv) any software product or platform
required to access the database.
20
DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD
2. Submit a useable copy of each database or data set identified in response to specification 1), any
accompanying data dictionary, and any software product or platform required to access the
database or data set. For each database or data set identified in response to specification 1) that
contains cost or margin information, submit one copy of each regularly produced (no more
frequently than in four week periods) report generated using that database since January 1, 2009,
and any documentation that defines, describes or explains the calculation in any terms, measures,
or aggregations appearing on the materials provided.
3. For all databases or data sets produced in response to the specifications 1) and 2), describe in
detail the relationship of the different tables in the database (e.g., an entity relationship diagram
and all foreign keys) and submit documents sufficient to show the tables that are populated by the
company, and the following items for each table: (a) the size of the table in both number of
records and bytes of information; (b) the table name; (c) a general description of the
information contained in the table; (d) a list of field names; (e) a definition for each field as it
is used by the company, including the meanings of all codes that can appear as field values; (f)
the format, including variable type and length, of each field; and (g) the primary key in a
given table that defines a unique observation.
21
DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD
 Why is this request so difficult and what is the potential way to approach this?
 Work with data dictionary and schema to determine what information exists in the
system.
 With the limited information you have (table and column names, as well as limited
descriptions), attempt to ascertain what information is relevant within the database.
Find a “super user.”
 Try to understand how the columns and tables that you have identified relate to each
other.
 Develop a “custom” query to extract that information into a “usable” format
(Microsoft Excel, delimited text file).
 Review & Produce…
22
DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD
Some Potential Problems:
 Unfortunately, the data dictionary and schema often do not exist, especially in the
case of a proprietary or legacy system.
 If one or the other doesn’t exist, this method becomes much more complex.
 Many fields in a typical database are not used, which adds complexity.
 This method can be very time consuming.
 Often it can result in a heated negotiation between parties (how did you choose those
fields, what other fields exist, how do we (opposing) know you gave us everything…
 You can leverage in-house resources, but then they may have to testify.
23
DATABASE DISCOVERY| THE “REPORT” METHOD
Commonly used to extract data to evaluate potential damages.
Sample Request
Documents sufficient to show: (a) the number of units sold by month, year and purchaser from January
1, 2001 to the present including product numbers; (b) the revenue attributable to each food product
by month and year from January 1, 2001 to the present; (c) the gross profit attributable to each food
product by month and year from January 1, 2001 to the present; (d) the net profit attributable to each
food product by month and year from January 1, 2001 to the present; and (e) any discounts, rebates
not reflected in price per unit.
For each food product identified in your answer to above, produce documents sufficient to show your
revenue, costs, including but not limited to both fixed and variable costs for each component, and
profit margin, from January 1, 2001 to the present.
24
DATABASE DISCOVERY| THE “REPORT” METHOD
Investigate the existing reporting functionality:
 Virtually every database-driven application has a built-in, somewhat user-friendly
reporting function.
 Generate a list of all the “standard” reports that are typically “run” from the system.
 Narrow the lengthy list to a select few and pull samples (repeat as necessary).
 Review the reports to determine whether they address the relevant activity
(potentially even meet and confer on the topic).
 Agree on the reports that will be produced and the timeframe applicable.
25
Practice Pointers
Databases v. Reports
Balancing the Pros and Cons
“Unstructured“ Data in the
“Structured" Database
The Truth is (Not) Always in the
Numbers
Meet-and-Confer Considerations
26
PRACTICE POINTERS
Assess the value of producing/seeking databases
versus reports
 How to prove or defend the case?
 What do your experts need?
 How substantial are costs and burdens -- and is fee
shifting a possibility?
 Is specialized software or hardware required for
native databases?
 Is the database structure (not just the data) a trade
secret?
27
PRACTICE POINTERS
Balancing some of the pros and cons of databases
and reports
 Reports are often easier to review, more limited
in scope, and generally less costly
 Databases are often incomprehensible to mere
mortals, open to any kind of search, and
generally more expensive -- for producing and
requesting parties
28
PRACTICE POINTERS
Beware the "unstructured" data hiding in the
"structured" database
 Open-text or free form fields
 Redacting databases with 10+ billion entries
 Anticipate privacy issues if personally identifiable
information exists
29
PRACTICE POINTERS
The truth is (not) always in the numbers
 Missing data or errors in the data
 Data dictionaries -- explaining the codes
 Figuring out how the database is "really" used
 Legacy system migrations and migraines
30
PRACTICE POINTERS
Meet-and-Confer Considerations
 Scope of relevant information
 Understand the systems before making/demanding
commitments
 Limitations on time period, fields, geography,
business units, etc.
 Availability of preexisting reports and creating
custom reports
 Listings of tables, columns, rows
 Data dictionaries and the schema
31
Q & A
Stephanie L. Giammarco
Partner, BDO Consulting
sgiammarco@bdo.com
Direct: 212-885-7439
Christopher J. Lopata
Of Counsel, Jones Day
cjlopata@jonesday.com
Direct: 212-326-3602

More Related Content

What's hot

Introduction to Metadata
Introduction to MetadataIntroduction to Metadata
Introduction to MetadataEUDAT
 
Semantic Applications for Financial Services
Semantic Applications for Financial ServicesSemantic Applications for Financial Services
Semantic Applications for Financial ServicesDavidSNewman
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesSaif Ullah
 
Data Lakes versus Data Warehouses
Data Lakes versus Data WarehousesData Lakes versus Data Warehouses
Data Lakes versus Data WarehousesTom Donoghue
 
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...Findwise
 
3 pillars of big data : structured data, semi structured data and unstructure...
3 pillars of big data : structured data, semi structured data and unstructure...3 pillars of big data : structured data, semi structured data and unstructure...
3 pillars of big data : structured data, semi structured data and unstructure...PROWEBSCRAPER
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Usedmurph4
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data MiningSi Krishan
 
Metadata For Catalogers (introductions)
Metadata For Catalogers (introductions)Metadata For Catalogers (introductions)
Metadata For Catalogers (introductions)robin fay
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
A Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining PresentationA Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining Presentationmillerca2
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data scienceJohnson Ubah
 
Introduction to-data-mining chapter 1
Introduction to-data-mining  chapter 1Introduction to-data-mining  chapter 1
Introduction to-data-mining chapter 1Mahmoud Alfarra
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar reportmayurik19
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics AKAGroup
 

What's hot (20)

Introduction to Metadata
Introduction to MetadataIntroduction to Metadata
Introduction to Metadata
 
Semantic Applications for Financial Services
Semantic Applications for Financial ServicesSemantic Applications for Financial Services
Semantic Applications for Financial Services
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 
Data mining
Data miningData mining
Data mining
 
Data Lakes versus Data Warehouses
Data Lakes versus Data WarehousesData Lakes versus Data Warehouses
Data Lakes versus Data Warehouses
 
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...
Enterprise Search White Paper: Beyond the Enterprise Data Warehouse - The Eme...
 
3 pillars of big data : structured data, semi structured data and unstructure...
3 pillars of big data : structured data, semi structured data and unstructure...3 pillars of big data : structured data, semi structured data and unstructure...
3 pillars of big data : structured data, semi structured data and unstructure...
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Use
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data Mining
 
Metadata For Catalogers (introductions)
Metadata For Catalogers (introductions)Metadata For Catalogers (introductions)
Metadata For Catalogers (introductions)
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
A Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining PresentationA Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining Presentation
 
Semantic Technology in Publishing & Finance
Semantic Technology in Publishing & FinanceSemantic Technology in Publishing & Finance
Semantic Technology in Publishing & Finance
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
 
Data mining
Data miningData mining
Data mining
 
Introduction to-data-mining chapter 1
Introduction to-data-mining  chapter 1Introduction to-data-mining  chapter 1
Introduction to-data-mining chapter 1
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics
 
Data Mining
Data MiningData Mining
Data Mining
 
Unit 1
Unit 1Unit 1
Unit 1
 

Similar to Understanding the Value of Database Discovery - Beyond Unstructured Data

KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfDr. Radhey Shyam
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
 
Accelerate Data Discovery
Accelerate Data Discovery   Accelerate Data Discovery
Accelerate Data Discovery Attivio
 
enterprise-data-everywhere
enterprise-data-everywhereenterprise-data-everywhere
enterprise-data-everywhereBill Peer
 
KIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfKIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfDr. Radhey Shyam
 
Data warehouse and data mining
Data warehouse and data miningData warehouse and data mining
Data warehouse and data miningRohit Kumar
 
CHAPTER5Database Systemsand Big DataRafal Olechows
CHAPTER5Database Systemsand Big DataRafal OlechowsCHAPTER5Database Systemsand Big DataRafal Olechows
CHAPTER5Database Systemsand Big DataRafal OlechowsJinElias52
 
Health Plan Survey Paper
Health Plan Survey PaperHealth Plan Survey Paper
Health Plan Survey PaperLisa Olive
 
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)Denodo
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Maximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformMaximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformNeo4j
 
HPCC Systems - Open source, Big Data Processing & Analytics
HPCC Systems - Open source, Big Data Processing & AnalyticsHPCC Systems - Open source, Big Data Processing & Analytics
HPCC Systems - Open source, Big Data Processing & AnalyticsHPCC Systems
 
Final ppt sec.data.coll
Final ppt sec.data.collFinal ppt sec.data.coll
Final ppt sec.data.collRam Sonawane
 

Similar to Understanding the Value of Database Discovery - Beyond Unstructured Data (20)

KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
Accelerate Data Discovery
Accelerate Data Discovery   Accelerate Data Discovery
Accelerate Data Discovery
 
enterprise-data-everywhere
enterprise-data-everywhereenterprise-data-everywhere
enterprise-data-everywhere
 
KIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfKIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdf
 
Data warehouse and data mining
Data warehouse and data miningData warehouse and data mining
Data warehouse and data mining
 
CHAPTER5Database Systemsand Big DataRafal Olechows
CHAPTER5Database Systemsand Big DataRafal OlechowsCHAPTER5Database Systemsand Big DataRafal Olechows
CHAPTER5Database Systemsand Big DataRafal Olechows
 
Health Plan Survey Paper
Health Plan Survey PaperHealth Plan Survey Paper
Health Plan Survey Paper
 
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
Empowering your Enterprise with a Self-Service Data Marketplace (ASEAN)
 
Hh
HhHh
Hh
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Maximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformMaximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data Platform
 
Database
DatabaseDatabase
Database
 
Database
DatabaseDatabase
Database
 
HPCC Systems - Open source, Big Data Processing & Analytics
HPCC Systems - Open source, Big Data Processing & AnalyticsHPCC Systems - Open source, Big Data Processing & Analytics
HPCC Systems - Open source, Big Data Processing & Analytics
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Final ppt sec.data.coll
Final ppt sec.data.collFinal ppt sec.data.coll
Final ppt sec.data.coll
 

More from Logikcull.com

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Logikcull.com
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleLogikcull.com
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull.com
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewLogikcull.com
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Logikcull.com
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastLogikcull.com
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastLogikcull.com
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy Logikcull.com
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantLogikcull.com
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastLogikcull.com
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Logikcull.com
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 Logikcull.com
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesLogikcull.com
 

More from Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 

Recently uploaded

如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 

Understanding the Value of Database Discovery - Beyond Unstructured Data

  • 1. 1 UNDERSTANDING THE VALUE OF DATABASE DISCOVERY BEYOND UNSTRUCTURED DATA
  • 2. 2 Join Today! aceds.org/join Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes Newsletter Affinity Partner Discounts “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3. 3
  • 4. 4 PRESENTERS Stephanie L. Giammarco sits on BDO’s Board of Directors and leads BDO’s Forensic Technology Services practice with more than 20 years of experience and a background in accounting, information technology and criminology. Having worked on some of the largest financial frauds to date, she has led teams creating databases of millions of records, performed advanced data analytics and provided testimony pertaining to damages and electronically stored information. Stephanie provides litigation and consulting services to organizations and their counsel, including data analytics, computer forensics and e-discovery services related to domestic and international matters involving product liability, financial statement fraud, class action lawsuits, internal investigations, securities fraud, employee and vendor schemes, and breach of contract. She is skilled in the collection, preservation and analysis of electronic evidence, as well as the implementation of various e-discovery tools. She has been deposed as a Rule 30(b)6 e-discovery witness and testified before the Judicial Arbitration Services on the calculation of damages in contract disputes. Stephanie has published and presented on a range of computer forensics and e-discovery topics, including before the Securities and Exchange Commission, Security Industry Authority and National Futures Association. Chris J. Lopata is of counsel at Jones Day in New York. His practice focuses on complex and general civil litigation, including product liability, toxic torts, credit reporting, and a wide range of business litigation. Chris is a member of the firm's e-Discovery Committee and serves as the New York office coordinator for e-discovery issues. Chris has led discovery teams in numerous joint defense groups. He has extensive experience coordinating affirmative and defensive e-discovery efforts on behalf of clients. Chris' practice extends beyond pretrial e-discovery. He has served as lead trial counsel in a variety of commercial disputes in New York State courts. He also has counseled clients who have sought and obtained favorable settlements in non-trial bound business disputes. The views set forth herein are the personal views of the author and do not necessarily reflect those of the law firm with which he is associated. Stephanie L. Giammarco, CPA/CITP, CFE, CEDS Partner, BDO Consulting sgiammarco@bdo.com Direct: 212-885-7439 Christopher J. Lopata Of Counsel, Jones Day cjlopata@jonesday.com Direct: 212-326-3602
  • 5. 5 OUR AGENDA 1. A quick poll of the audience… 2. Structured v. unstructured data 3. Some necessary definitions 4. Examples of database-driven applications 5. The database schema and data dictionary 6. Theories of database discovery 7. Database discovery: methods for “pulling” data for review and production 8. Practice pointers
  • 6. 6 A Quick Poll… … on Database Discovery
  • 7. 7 A QUICK POLL… Who knows what a database is? A fancy Excel spreadsheet. A collection of rows and columns, each populated with a value. Who has used a database as part of their personal or work activities? All of you have…Google & Lexus for research. Your time-keeping system, Concordance, Summation, and Relativity, are all databases. Your company’s email system is effectively a database. Who has had to conduct discovery from a database (or database-driven application)? Sales and Marketing (CRM), Human Resources (HRIS), and GL/Inventory (ERP). SAP, and Hyperion are perfect examples. Bonus Question: Who can tell me what a relational database is? A bunch of Excel spreadsheets (tables) linked together by a common key…
  • 8. 8 DEFINITIONS Unstructured v. Structured Data The Table The Relational Database
  • 9. 9 DEFINITIONS| UNSTRUCTURED V. STRUCTURED DATA Unstructured Data  Wikipedia definition: Unstructured Data (or unstructured information) refers to information that does not have a pre-defined data model. Unstructured information is typically text-heavy, but may contain data such as dates, numbers, and facts as well.  Translation: MS office files, loose files, most of the information that you can see via Windows Explorer. Structured Data  Definition: Structured Data is information that resides in fixed fields within a record or file, or is information that is organized into rows and columns, with pre-set characteristics.  Translation: Multiple tables, containing rows and columns which relate to each other via common key.
  • 10. 10 DEFINITIONS| THE TABLE (THE CORE OF THE DATABASE)  Records, not files…  Rows v. columns  Tables maintain the relationship between columns  A field is another way of saying column  Data values, in the context of rows, columns and tables, is the substance  Real-time, constantly changing information  Data dictionary  Schema
  • 11. 11 DEFINITIONS| THE RELATIONAL DATABASE  Some databases only have one table (flat file systems) and are no different than a Microsoft Excel spreadsheet (very rare).  Relational databases, which are much more common, have multiple tables, each with a key that “links” them together.  How can relational databases be more challenging to handle than flat file systems in the context of discovery?  Why do we use databases?
  • 13. 13 DATABASES| DATABASE-DRIVEN APPLICATIONS A database, when combined with a user interface is often called a database-driven application.  Enterprise Resource Planning (ERP)  Data Warehouses & Business Intelligence Systems  Human Resource Information System (HRIS)  Customer Relationship Management (CRM)  Adverse Effects Systems  SharePoint  Email Archiving Systems  kCura Relativity DATABASES ARE ALL AROUND US AND WE WORK WITH THEM EVERY DAY.
  • 14. 14 DATABASES| THE SCHEMA The database schema is the key to understanding:  What tables of data exist within the relational database.  The name assigned to each column within each table.  How the columns are grouped together in each table.  How the tables relate to each other.
  • 15. 15 DATABASES| THE DATA DICTIONARY  Within the STUDENTS table, there are two columns of information. – The STUDENT column contains the name of the student enrolled in the university – The ID column is the unique identification number assigned to each student  Within the ACTIVITIES table, there are four columns of information. – The ID column is the unique identification number assigned to each student – The ACTIVITY1 column contains the name of the activity they are registered for – The COST1 column contains the fee paid to the school for the activity – The ACTIVITY2 column represents the secondary (if any) activity that the student is registered for – The COST2 column contains the fee paid to the school for the secondary activity  The ID field is the primary key between the STUDENTS and ACTIVITIES tables.
  • 17. 17 DATABASE DISCOVERY Theory #1 – Reports are all that matter...
  • 18. 18 DATABASE DISCOVERY Theory #2 – Data is all that matters...  Databases are huge, historical repositories of “activity” – Information inserted into a CRM system by an sales person, recording customer wins and losses, potential new business opportunities, or even other uses for a medication he or she is selling (Pharmaceutical Sales). – The price point for a specific medication inserted into a POS system, and the entity that is paying for it (Medicare Fraud). – A history of consistent payments to a “false” or “suspicious” entity in the general ledger (within the ERP system) (FCPA).  The best way to identify trends is to pull large amounts of data into a usable format - sort, filter, and investigate.
  • 19. 19 DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD Just get the data out. Common in DOJ and FTC requests for data. Also used to provide raw data to experts for analysis. Sample DOJ Database Request 1. Identify each electronic or other database or data set used or maintained by the company at any time after January 1, 2009, without regard to custodian, that contains information concerning the company’s (a) products and product codes; (b) facilities; (c) production; (d) shipments; (e) sales; (f) prices; (g) margins; (h) costs, including but not limited to production costs, distribution costs, research and development costs, storage costs, standard costs, expected costs, and opportunity costs; (i) patents or other intellectual property; (j) research or development projects; or (k) customers, to the extent such customer information is not provided in response to specifications 9 and 10. For each such database, identify (i) the database type, i.e., flat, relational, or enterprise; (ii) the size in both number of records and bytes of information; (iii) the fields, query forms, and reports available or maintained; and (iv) any software product or platform required to access the database.
  • 20. 20 DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD 2. Submit a useable copy of each database or data set identified in response to specification 1), any accompanying data dictionary, and any software product or platform required to access the database or data set. For each database or data set identified in response to specification 1) that contains cost or margin information, submit one copy of each regularly produced (no more frequently than in four week periods) report generated using that database since January 1, 2009, and any documentation that defines, describes or explains the calculation in any terms, measures, or aggregations appearing on the materials provided. 3. For all databases or data sets produced in response to the specifications 1) and 2), describe in detail the relationship of the different tables in the database (e.g., an entity relationship diagram and all foreign keys) and submit documents sufficient to show the tables that are populated by the company, and the following items for each table: (a) the size of the table in both number of records and bytes of information; (b) the table name; (c) a general description of the information contained in the table; (d) a list of field names; (e) a definition for each field as it is used by the company, including the meanings of all codes that can appear as field values; (f) the format, including variable type and length, of each field; and (g) the primary key in a given table that defines a unique observation.
  • 21. 21 DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD  Why is this request so difficult and what is the potential way to approach this?  Work with data dictionary and schema to determine what information exists in the system.  With the limited information you have (table and column names, as well as limited descriptions), attempt to ascertain what information is relevant within the database. Find a “super user.”  Try to understand how the columns and tables that you have identified relate to each other.  Develop a “custom” query to extract that information into a “usable” format (Microsoft Excel, delimited text file).  Review & Produce…
  • 22. 22 DATABASE DISCOVERY| THE “BRUTE FORCE” METHOD Some Potential Problems:  Unfortunately, the data dictionary and schema often do not exist, especially in the case of a proprietary or legacy system.  If one or the other doesn’t exist, this method becomes much more complex.  Many fields in a typical database are not used, which adds complexity.  This method can be very time consuming.  Often it can result in a heated negotiation between parties (how did you choose those fields, what other fields exist, how do we (opposing) know you gave us everything…  You can leverage in-house resources, but then they may have to testify.
  • 23. 23 DATABASE DISCOVERY| THE “REPORT” METHOD Commonly used to extract data to evaluate potential damages. Sample Request Documents sufficient to show: (a) the number of units sold by month, year and purchaser from January 1, 2001 to the present including product numbers; (b) the revenue attributable to each food product by month and year from January 1, 2001 to the present; (c) the gross profit attributable to each food product by month and year from January 1, 2001 to the present; (d) the net profit attributable to each food product by month and year from January 1, 2001 to the present; and (e) any discounts, rebates not reflected in price per unit. For each food product identified in your answer to above, produce documents sufficient to show your revenue, costs, including but not limited to both fixed and variable costs for each component, and profit margin, from January 1, 2001 to the present.
  • 24. 24 DATABASE DISCOVERY| THE “REPORT” METHOD Investigate the existing reporting functionality:  Virtually every database-driven application has a built-in, somewhat user-friendly reporting function.  Generate a list of all the “standard” reports that are typically “run” from the system.  Narrow the lengthy list to a select few and pull samples (repeat as necessary).  Review the reports to determine whether they address the relevant activity (potentially even meet and confer on the topic).  Agree on the reports that will be produced and the timeframe applicable.
  • 25. 25 Practice Pointers Databases v. Reports Balancing the Pros and Cons “Unstructured“ Data in the “Structured" Database The Truth is (Not) Always in the Numbers Meet-and-Confer Considerations
  • 26. 26 PRACTICE POINTERS Assess the value of producing/seeking databases versus reports  How to prove or defend the case?  What do your experts need?  How substantial are costs and burdens -- and is fee shifting a possibility?  Is specialized software or hardware required for native databases?  Is the database structure (not just the data) a trade secret?
  • 27. 27 PRACTICE POINTERS Balancing some of the pros and cons of databases and reports  Reports are often easier to review, more limited in scope, and generally less costly  Databases are often incomprehensible to mere mortals, open to any kind of search, and generally more expensive -- for producing and requesting parties
  • 28. 28 PRACTICE POINTERS Beware the "unstructured" data hiding in the "structured" database  Open-text or free form fields  Redacting databases with 10+ billion entries  Anticipate privacy issues if personally identifiable information exists
  • 29. 29 PRACTICE POINTERS The truth is (not) always in the numbers  Missing data or errors in the data  Data dictionaries -- explaining the codes  Figuring out how the database is "really" used  Legacy system migrations and migraines
  • 30. 30 PRACTICE POINTERS Meet-and-Confer Considerations  Scope of relevant information  Understand the systems before making/demanding commitments  Limitations on time period, fields, geography, business units, etc.  Availability of preexisting reports and creating custom reports  Listings of tables, columns, rows  Data dictionaries and the schema
  • 31. 31 Q & A Stephanie L. Giammarco Partner, BDO Consulting sgiammarco@bdo.com Direct: 212-885-7439 Christopher J. Lopata Of Counsel, Jones Day cjlopata@jonesday.com Direct: 212-326-3602

Editor's Notes

  1. Hello and welcome to this ACEDS webcast, Understanding the Value of Database Discovery – Beyond Unstructured Data, presented by BDO. I`m Robert Hilson of ACEDS and I`m joined today by two excellent presenters, who I will introduce in a moment. First I have two brief announcements.
  2. I’d like to welcome everyone on the call who is new to ACEDS. ACEDS is a membership association owned and managed by Barbri that is committed to promoting e-discovery skill and competence through training, education, and networking. We offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners. You can join today
  3. ACEDS members, CEDS and conference alumni can attend this year’s conference at special rates. We’re moving this year to the Gaylord National Resort in Washington, DC, where we’ll be from September 28 to the 30. We expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Last week, we announced several new speakers, including Craig Ball and Peter Stein, who is an attorney and Director of Flight Operations at Johnson Controls. If you visit ediscoveryconference.com, you can and learn more about the program and the topics we`ll cover, and if you feel so inclined, you can register to attend.
  4. Okay, let’s get started. We have two excellent presenters for you today. They both have very impressive bios, which are on our site. I encourage you to go there and read them in full. Stephanie Giammarco you know. She sits on BDO’s Board of Directors and leads the firm’s Forensic Technology Services practice. She has more than 20 years of experience and a background in accounting, information technology and criminology. Having worked on some of the largest financial frauds to date, she has led teams creating databases of millions of records, performed advanced data analytics and provided testimony pertaining to damages and electronically stored information. She is also CEDS-certified and is a member of the ACEDS Advisory Board. Stephanie, it’s great to be with you again. Thanks for being here. Stephanie is joined by Chris Lopata, an attorney at Jones Day in New York. His practice focuses on complex and general civil litigation, including product liability, toxic torts, credit reporting, and a wide range of business litigation. Chris is a member of the firm's e-Discovery Committee and serves as the New York office coordinator for e-discovery issues. He has led discovery teams in numerous joint defense groups, and has extensive experience coordinating affirmative and defensive e-discovery efforts on behalf of clients. Chris, thanks for being here. Alright, before we get started, I do want to encourage everyone to ask questions, and we will try to get to them at the end of the presentation if time allows.
  5. Enterprise Resource Planning (ERP): Inventory, general ledger, accounts receivable, and accounts payable. SAP is the most common examples. Data Warehouses & Business Intelligence Systems: A data warehouse is a centralized system with “summary data”. BI software is usually the application that helps generate reports from a data warehouse or group of enterprise systems. Hyperion and BlackLine are common examples. Human Resource Information System (HRIS): Employee data, job history, performance information, salary history. SAP or Ultipro are common examples. Customer Relationship Management (CRM): Client information, sales activity, order history. SFDC is one of the most popular examples. Adverse Effects Systems: A database that tracks all reports related to a specific medication or medical device. SharePoint: Looks like a file storage system, but it’s actually a relational database behind the scenes. Using SP for documents v. structured data (lists). SP is generally good, but conducting discovery against the system is very challenging. Email Archiving Systems: A perfect example of a database with built in search/export functionality. kCura Relativity: A database full of metadata, linked to files. DATABASES ARE ALL AROUND US AND WE WORK WITH THEM EVERY DAY.
  6. Databases are designed for reports. The database itself is not necessarily relevant because it’s just a huge volume of discrete data elements, which individually mean nothing, until they are assembled into a report. The reports that are generated from the system and provided to various levels of management are what “drive” decisions at the company. More often than not, it’s those decisions that are the root cause for the dispute. Hence, it’s the reports that are potentially relevant, not the database itself.
  7. Reporting functionality usually ensures that the data coming out is in a much more usable format (column headers, formatting, etc.)