30.06.2015 Views

Entire Issue - National Association of Legal Assistants

Entire Issue - National Association of Legal Assistants

Entire Issue - National Association of Legal Assistants

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TECHNOBITS<br />

Use the Technology<br />

Electronic Discovery<br />

by Alan Kays, Uniscribe<br />

The following article was first published in the Spring<br />

2003 issue <strong>of</strong> Discovery Edge, a publication <strong>of</strong> Uniscribe<br />

Pr<strong>of</strong>essional Services, Inc., 200 Connecticut Ave., Norwalk, CT<br />

06854. It is transcribed and reprinted here with permission <strong>of</strong><br />

Uniscribe and Alan Kays.<br />

Over the past 20 years, individual employees <strong>of</strong> corporations<br />

have unwittingly gained more power to influence litigation.<br />

They are creating more electronic documents, which<br />

tell more <strong>of</strong> the story than the individuals may have ever<br />

intended. Yet this story can only be heard by attorneys willing<br />

to meet changes in business practice with changes in<br />

their discovery habits.<br />

Individuals have always written letters, memoranda,<br />

reports, and telephone messages upon which evidentiary<br />

support is built, whether to support the claims in a litigation<br />

or to refute them. Traditionally, however, these documents<br />

have existed in paper form, where the reader had no access<br />

to any collateral information about the document’s creator—<br />

or about the creator’s thought process. Now that individuals<br />

are creating those documents in electronic form and sharing<br />

them via e-mail, they are generating a higher volume <strong>of</strong> documents<br />

and communication. And they are leaving fascinating<br />

clues for attorneys to discover—if attorneys are willing to<br />

look beyond the paper.<br />

Developments like the desktop revolution <strong>of</strong> the mid-<br />

1980s have allowed individuals in an organization to generate<br />

an unprecedented number <strong>of</strong> electronic documents. Simultaneously,<br />

however, the technology has been creating and storing<br />

an unprecedented amount <strong>of</strong> information about its users.<br />

Nowhere to Hide<br />

Word processing documents can tell who may have created<br />

the file, as well as when, and how many times they were edited.<br />

These documents can also contain actual edited information<br />

that does not appear in the final paper form. Spreadsheets contain<br />

hidden columns and rows that may not be visible when<br />

printed on paper. Even the computer’s operating system holds<br />

massive amounts <strong>of</strong> information as to the user’s computer habits<br />

by saving temporary versions <strong>of</strong> created and received files, and<br />

logging the Web sites the user has visited.<br />

This information is most <strong>of</strong>ten only accessible to attorneys<br />

who seek out electronic files in their native format.<br />

Hard drive discovery forensics has been a highly useful tool<br />

in the investigation <strong>of</strong> terrorists and in efforts to control<br />

child pornography rings. But what is the value <strong>of</strong> electronic<br />

information for an “average” civil litigation?<br />

The truth is that electronic files and their metadata<br />

(the underlying data <strong>of</strong> a file, the properties <strong>of</strong> that file, and<br />

the data the s<strong>of</strong>tware uses to manage the file) give attorneys<br />

rich insight into the thought processes and breadth <strong>of</strong> concurrent<br />

knowledge <strong>of</strong> a company’s operations and strategies.<br />

Common metadata includes file type, file size, date created,<br />

date last modified, created by, and title.<br />

E-mail is a particularly rich source <strong>of</strong> information,<br />

allowing attorneys to “eavesdrop” on an almost uninterrupted,<br />

stream-<strong>of</strong>-consciousness “conversation” between participants.<br />

Messages tend to be candid and casual, with participants<br />

acting and reacting on the emotional spur <strong>of</strong> the<br />

moment. Files frequently accompany strands <strong>of</strong> the electronic<br />

conversation, establishing true linkage as to “who knew<br />

what and when did they know it?” Like other electronic<br />

documents, e-mails also carry metadata that may be invisible<br />

when the files are printed, including blind carbon copies<br />

(BCC), date and time sent, and the date and time received.<br />

Most attorneys do not access electronic documents and<br />

metadata voluntarily, but in response to a discovery request,<br />

or a regulatory request specifically aimed at data. The resulting<br />

process <strong>of</strong> electronic discovery which involves collection,<br />

analysis, review, conversion, and production <strong>of</strong> electronic<br />

data, <strong>of</strong>ten becomes the world’s most complicated way to<br />

generate paper.<br />

By understanding how electronic discovery works, attorneys<br />

and their legal teams may be able to see that valuable<br />

data is within easy reach <strong>of</strong> their current approach, adding<br />

value to their case that more than justifies any additional cost.<br />

The Process<br />

There are five phases to effective electronic data processing,<br />

only a few <strong>of</strong> which are negotiable<br />

1. Harvesting—the collection <strong>of</strong> possible responsive<br />

data from their original locations. This step is required for<br />

40<br />

FACTS & FINDINGS / AUGUST 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!