Traversing the triangle

Preview:

Citation preview

Traversing ‘The Triangle’: Best Practices for Managing and Improving Law Firm-Client-Service Provider Relationships

Speakers: Lael Andara, Ropers MajeskiDavid Kearney, Cohen & GrigsbyEric Robinson, Kroll Ontrack

2

ACEDS Membership Benefits

Training, Resources and Networking for the E-Discovery Community

Join Today! aceds.org/join or Call ACEDS Member Services 786-517-2701

Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking

Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More!

“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale

3

Topics We Cover Computer Assisted Review

International E-Discovery

Social Media

Cloud-Based Discovery

E-Discovery Malpractice

Workplace Privacy

State E-Discovery Rules

And Many More!

ACEDS Web Seminars Provide Vital Training

aceds.org/join

Speakers

David Kearney, CEDS |Director of Technology Services | Cohen & Grigsby |Pittsburgh

Lael Andara |Litigation Partner |Ropers Majeski Kohn Bentley |Redwood City, CA

Eric RobinsonSolutions Architect Kroll OntrackRichmond, VA

‘The Triangle’

Client

CounselService

Provider

Why Should I Care?

• Unverified Qualcomm v. Broadcom

• Too many cooks Coquina Investments v. Rothstein and TD Bank

• Malpractice J-M Manufacturing Company, Inc. v. McDermott Will & Emery

• Finger pointing

• Duplicative production/efforts

• Inelastic

War Stories

Context of the Relationship

• “Just, speedy, and inexpensive determination”

• “Reasonable”

• “Proportional”

• “Cooperation”

• “eCompetence”

End Goal: Trial Exhibits

Foundation to process

• Educate What does the client have?

• Educate What does the adversary have? • Educate What do third parties have?

• Collaborate Limit the scope by stipulation

Three Goals: One Objective• Reduce cost

– Data map– Preservation– Collection – Processing

• Data privacy – Security – EU compliance

• Increase efficiency – Cooperate in ESI conferences– Production – Understand exposure early– Early resolution

Discovery Goals

Evidence

Defensible Admissible Authenticate

Reduce cost

Data privacy Increase efficiency

Discovery Timeline• Step one – Preservation notice to custodians and IT &

litigation hold to adversary

• Step two – Introduce Vendor and Client to facilitate trust and create shared objectives. Privacy in production in Production.

• Step three – Inventory and snapshot all data in possession or control of

client. This includes employee personal devices.

Data Hold

Discovery Timeline• Step four– Preparation for preparation for meet & confer and

cooperate with opposing counsel on discovery protocol and plan Stipulation*

• Step five– Have vendor begin collection and process data.

Culling, keyword, etc.

• Step six– Review documents filtered as privileged. Issue

tagging and mark for production

Building process

Time

Volume

Proportional

Services

Price

Budget

Big Picture• Key

Requirements in the Contract

• Communication Infrastructure

Time LibraryCost Data Preservation LibraryCost Data Preservation

Close of Discovery: June 4, 2013

DAYS68

© Lael Andara

Johnson & Johnson v. Shasta Tech., LLC, et al

Close of Discovery: June 4, 2013

DAYS68

5/12/1330(b)(6) Depo

5/10/13Preservation Update

5/22/13CMC

5/2/13Responses to RFPD

LibraryTime Data PreservationCost

Budget

Jan. Feb.

MarchApril

MayJune

Cost

Hosting: $2,657/month Production Database

ARPAID

Last Update: 3/29/13

Johnson & Johnson v. Shasta Tech., LLC, et al

Time PreservationCost Data Library

Johnson & Johnson v. Shasta Tech., LLC, et al

Collected8/2/12 12/3/12 3/17/13 Total Data

150 GB 12 GB 20 GB 182 GB

ProcessingProduction

Shasta Tech., SHASTA_0032089

Conductive Tech., CT_0052893

Pharmatech Inc., PHARM0005271

LifeScan, Inc., LSS00311833

Total Files 402,086

62%

6%

Database:

Last Update: 3/29/13

Clarity of Expectations

Managing and Monitoring Relationships

In the Bermuda Triangle of E-Discovery

Counsel

Client

Service Provider

Transparent Process

CounselService Provider

Client

Exclusion Process

CounselVendor

Client

Attorney-Client Privilege

Communication Not Privileged

Sample Language for Extending Privilege

• All work performed by Kroll Ontrack on this project will be conducted at the direction of and under the supervision of {Law Firm} in their capacity as counsel to {End-Client} on the {Name of Matter} and as such, all communications and documents exchanged between Kroll Ontrack, {Law Firm} and {End-Client} shall be protected by the attorney-client privilege and work product doctrine.

Communication Infrastructure

Counsel

Client

Service Provider

Relationship Protocol

Counsel

Client

Service Provider

Cost Effective CommunicationCost Effective Communication

Client

Service Provider

Counsel

CounselVendor

Client

Verification of Data

Quality Assurance Process

Keys to Success!

Trust, but Verify

Define Accountability

Competence & Redundancy

Group buy-in

Active Communication of Process

Evolve with the Data

Questions?

Thank You

Lael Andara | Partner | Ropers Majeski Kohn Bentleylandara@rmkb.com

Eric Robinson | Solutions Architect | Kroll Ontrackerobinson@krollontrack.com

David Kearney | Director of Technology Services | Cohen & GrigsbyDKearney@cohenlaw.com

Traversing ‘The Triangle’