Entire Issue - National Association of Legal Assistants
Entire Issue - National Association of Legal Assistants
Entire Issue - National Association of Legal Assistants
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TECHNOBITS<br />
Use the Technology<br />
Electronic Discovery<br />
by Alan Kays, Uniscribe<br />
The following article was first published in the Spring<br />
2003 issue <strong>of</strong> Discovery Edge, a publication <strong>of</strong> Uniscribe<br />
Pr<strong>of</strong>essional Services, Inc., 200 Connecticut Ave., Norwalk, CT<br />
06854. It is transcribed and reprinted here with permission <strong>of</strong><br />
Uniscribe and Alan Kays.<br />
Over the past 20 years, individual employees <strong>of</strong> corporations<br />
have unwittingly gained more power to influence litigation.<br />
They are creating more electronic documents, which<br />
tell more <strong>of</strong> the story than the individuals may have ever<br />
intended. Yet this story can only be heard by attorneys willing<br />
to meet changes in business practice with changes in<br />
their discovery habits.<br />
Individuals have always written letters, memoranda,<br />
reports, and telephone messages upon which evidentiary<br />
support is built, whether to support the claims in a litigation<br />
or to refute them. Traditionally, however, these documents<br />
have existed in paper form, where the reader had no access<br />
to any collateral information about the document’s creator—<br />
or about the creator’s thought process. Now that individuals<br />
are creating those documents in electronic form and sharing<br />
them via e-mail, they are generating a higher volume <strong>of</strong> documents<br />
and communication. And they are leaving fascinating<br />
clues for attorneys to discover—if attorneys are willing to<br />
look beyond the paper.<br />
Developments like the desktop revolution <strong>of</strong> the mid-<br />
1980s have allowed individuals in an organization to generate<br />
an unprecedented number <strong>of</strong> electronic documents. Simultaneously,<br />
however, the technology has been creating and storing<br />
an unprecedented amount <strong>of</strong> information about its users.<br />
Nowhere to Hide<br />
Word processing documents can tell who may have created<br />
the file, as well as when, and how many times they were edited.<br />
These documents can also contain actual edited information<br />
that does not appear in the final paper form. Spreadsheets contain<br />
hidden columns and rows that may not be visible when<br />
printed on paper. Even the computer’s operating system holds<br />
massive amounts <strong>of</strong> information as to the user’s computer habits<br />
by saving temporary versions <strong>of</strong> created and received files, and<br />
logging the Web sites the user has visited.<br />
This information is most <strong>of</strong>ten only accessible to attorneys<br />
who seek out electronic files in their native format.<br />
Hard drive discovery forensics has been a highly useful tool<br />
in the investigation <strong>of</strong> terrorists and in efforts to control<br />
child pornography rings. But what is the value <strong>of</strong> electronic<br />
information for an “average” civil litigation?<br />
The truth is that electronic files and their metadata<br />
(the underlying data <strong>of</strong> a file, the properties <strong>of</strong> that file, and<br />
the data the s<strong>of</strong>tware uses to manage the file) give attorneys<br />
rich insight into the thought processes and breadth <strong>of</strong> concurrent<br />
knowledge <strong>of</strong> a company’s operations and strategies.<br />
Common metadata includes file type, file size, date created,<br />
date last modified, created by, and title.<br />
E-mail is a particularly rich source <strong>of</strong> information,<br />
allowing attorneys to “eavesdrop” on an almost uninterrupted,<br />
stream-<strong>of</strong>-consciousness “conversation” between participants.<br />
Messages tend to be candid and casual, with participants<br />
acting and reacting on the emotional spur <strong>of</strong> the<br />
moment. Files frequently accompany strands <strong>of</strong> the electronic<br />
conversation, establishing true linkage as to “who knew<br />
what and when did they know it?” Like other electronic<br />
documents, e-mails also carry metadata that may be invisible<br />
when the files are printed, including blind carbon copies<br />
(BCC), date and time sent, and the date and time received.<br />
Most attorneys do not access electronic documents and<br />
metadata voluntarily, but in response to a discovery request,<br />
or a regulatory request specifically aimed at data. The resulting<br />
process <strong>of</strong> electronic discovery which involves collection,<br />
analysis, review, conversion, and production <strong>of</strong> electronic<br />
data, <strong>of</strong>ten becomes the world’s most complicated way to<br />
generate paper.<br />
By understanding how electronic discovery works, attorneys<br />
and their legal teams may be able to see that valuable<br />
data is within easy reach <strong>of</strong> their current approach, adding<br />
value to their case that more than justifies any additional cost.<br />
The Process<br />
There are five phases to effective electronic data processing,<br />
only a few <strong>of</strong> which are negotiable<br />
1. Harvesting—the collection <strong>of</strong> possible responsive<br />
data from their original locations. This step is required for<br />
40<br />
FACTS & FINDINGS / AUGUST 2003