E-Discovery Process: From Collection to Review

This lesson will provide a foundational understanding of the E-Discovery process, focusing on the steps from data collection to its review. You'll learn about the different stages, key considerations, and tools used to manage electronically stored information (ESI) in litigation. This will prepare you to be a more effective paralegal handling E-Discovery tasks.

Learning Objectives

  • Identify the major stages of the E-Discovery process.
  • Explain different methods of data collection and their suitability based on the data type.
  • Describe the process of data processing, including de-duplication and keyword searching.
  • Understand the importance of document review and the tools used to facilitate it.

Text-to-Speech

Listen to the lesson content

Lesson Content

E-Discovery Process Overview

E-Discovery is the process of identifying, collecting, preserving, processing, reviewing, and producing electronically stored information (ESI) in legal cases. It's crucial because most evidence now exists digitally. The process can be broken down into the following key stages:

  • Identification: Identifying potential sources of ESI. This involves understanding where the relevant information is located (e.g., emails, hard drives, cloud storage, social media).
  • Preservation: Taking steps to ensure that ESI is protected from alteration or destruction. This involves issuing legal holds and suspending routine data destruction policies.
  • Collection: Gathering the identified ESI. This can involve different methods, ranging from forensic imaging to targeted data extraction.
  • Processing: Transforming the collected data into a usable format for review. This involves removing duplicates, extracting metadata, and making the data searchable.
  • Review: Examining the processed data to determine its relevance and privilege (e.g., attorney-client privilege).
  • Production: Producing the relevant and non-privileged documents to the opposing party. This may involve redacting confidential information and converting documents into a standardized format.

Data Collection Methods

The method of data collection depends on the type and location of ESI. Here are some common methods:

  • Forensic Imaging: Creating an exact, bit-for-bit copy of a storage device (e.g., hard drive, USB drive). This preserves the original data and metadata. Example: If you suspect a crucial document resides on an employee's laptop, forensic imaging preserves that entire digital footprint.
  • Targeted Collection: Collecting specific data based on search terms, custodians, or date ranges. This is often used for emails and cloud-based data. Example: Collecting only emails from a specific employee related to a particular project.
  • Remote Collection: Downloading data from remote sources such as cloud storage or employee mobile devices. Example: Using a tool to access and download data from a Microsoft OneDrive account.
  • Custodian Interview: Interviewing the custodian of the data, this is not a data collection method itself but is important to clarify the nature and location of ESI, and to assist in the other methods.

It's important to document the collection process thoroughly, including the chain of custody.

Data Processing: Making Data Usable

Once data is collected, it needs to be processed. This transforms the raw data into a usable and searchable format.

  • De-duplication: Removing duplicate copies of documents to reduce review volume. This saves time and cost. Example: If the same email is sent to multiple people, you only need to review it once.
  • Keyword Searching: Identifying documents based on search terms. Example: Searching for all documents containing the words "contract" or "breach".
  • Optical Character Recognition (OCR): Converting scanned images of text into searchable text. Example: Converting a scanned PDF document into a searchable document.
  • Metadata Extraction: Extracting and analyzing metadata (e.g., author, date created, date modified, file type). Example: Examining the creation date of a document to understand its timeline in a case.

Processing tools like Relativity, Everlaw, and Logikcull are frequently used for these tasks.

Document Review: Finding the Relevant Information

Document review is the most labor-intensive part of E-Discovery. It involves reviewing the processed documents to identify:

  • Relevance: Determining if the document is related to the issues in the case.
  • Privilege: Identifying documents protected by attorney-client privilege or other privileges (e.g., work product doctrine).
  • Responsiveness: Determining if a document falls within the scope of a discovery request.

Review is often conducted using specialized software that allows paralegals to tag, code, and annotate documents. Example: A paralegal might code a document as "relevant," "privileged," or "responsive to Request 1." The software assists by offering features such as:
* Redaction Tools: to mask privileged or confidential information.
* Workflow tools to manage the review process.
* Reporting features: to track review progress and identify key findings.

Progress
0%