31
Traversing ‘The Triangle’: Best Practices for Managing and Improving Law Firm- Client-Service Provider Relationships Speakers: Lael Andara, Ropers Majeski David Kearney, Cohen & Grigsby Eric Robinson, Kroll Ontrack

Traversing the triangle

Embed Size (px)

Citation preview

Page 1: Traversing the triangle

Traversing ‘The Triangle’: Best Practices for Managing and Improving Law Firm-Client-Service Provider Relationships

Speakers: Lael Andara, Ropers MajeskiDavid Kearney, Cohen & GrigsbyEric Robinson, Kroll Ontrack

Page 2: Traversing the triangle

2

ACEDS Membership Benefits

Training, Resources and Networking for the E-Discovery Community

Join Today! aceds.org/join or Call ACEDS Member Services 786-517-2701

Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking

Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More!

“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale

Page 3: Traversing the triangle

3

Topics We Cover Computer Assisted Review

International E-Discovery

Social Media

Cloud-Based Discovery

E-Discovery Malpractice

Workplace Privacy

State E-Discovery Rules

And Many More!

ACEDS Web Seminars Provide Vital Training

aceds.org/join

Page 4: Traversing the triangle

Speakers

David Kearney, CEDS |Director of Technology Services | Cohen & Grigsby |Pittsburgh

Lael Andara |Litigation Partner |Ropers Majeski Kohn Bentley |Redwood City, CA

Eric RobinsonSolutions Architect Kroll OntrackRichmond, VA

Page 5: Traversing the triangle

‘The Triangle’

Client

CounselService

Provider

Page 6: Traversing the triangle

Why Should I Care?

• Unverified Qualcomm v. Broadcom

• Too many cooks Coquina Investments v. Rothstein and TD Bank

• Malpractice J-M Manufacturing Company, Inc. v. McDermott Will & Emery

• Finger pointing

• Duplicative production/efforts

• Inelastic

Page 7: Traversing the triangle

War Stories

Page 8: Traversing the triangle

Context of the Relationship

• “Just, speedy, and inexpensive determination”

• “Reasonable”

• “Proportional”

• “Cooperation”

• “eCompetence”

End Goal: Trial Exhibits

Page 9: Traversing the triangle

Foundation to process

• Educate What does the client have?

• Educate What does the adversary have? • Educate What do third parties have?

• Collaborate Limit the scope by stipulation

Page 10: Traversing the triangle

Three Goals: One Objective• Reduce cost

– Data map– Preservation– Collection – Processing

• Data privacy – Security – EU compliance

• Increase efficiency – Cooperate in ESI conferences– Production – Understand exposure early– Early resolution

Page 11: Traversing the triangle

Discovery Goals

Evidence

Defensible Admissible Authenticate

Reduce cost

Data privacy Increase efficiency

Page 12: Traversing the triangle

Discovery Timeline• Step one – Preservation notice to custodians and IT &

litigation hold to adversary

• Step two – Introduce Vendor and Client to facilitate trust and create shared objectives. Privacy in production in Production.

• Step three – Inventory and snapshot all data in possession or control of

client. This includes employee personal devices.

Data Hold

Page 13: Traversing the triangle

Discovery Timeline• Step four– Preparation for preparation for meet & confer and

cooperate with opposing counsel on discovery protocol and plan Stipulation*

• Step five– Have vendor begin collection and process data.

Culling, keyword, etc.

• Step six– Review documents filtered as privileged. Issue

tagging and mark for production

Page 14: Traversing the triangle

Building process

Time

Volume

Proportional

Services

Price

Budget

Page 15: Traversing the triangle

Big Picture• Key

Requirements in the Contract

• Communication Infrastructure

Page 16: Traversing the triangle

Time LibraryCost Data Preservation LibraryCost Data Preservation

Close of Discovery: June 4, 2013

DAYS68

© Lael Andara

Johnson & Johnson v. Shasta Tech., LLC, et al

Close of Discovery: June 4, 2013

DAYS68

5/12/1330(b)(6) Depo

5/10/13Preservation Update

5/22/13CMC

5/2/13Responses to RFPD

Page 17: Traversing the triangle

LibraryTime Data PreservationCost

Budget

Jan. Feb.

MarchApril

MayJune

Cost

Hosting: $2,657/month Production Database

ARPAID

Last Update: 3/29/13

Johnson & Johnson v. Shasta Tech., LLC, et al

Page 18: Traversing the triangle

Time PreservationCost Data Library

Johnson & Johnson v. Shasta Tech., LLC, et al

Collected8/2/12 12/3/12 3/17/13 Total Data

150 GB 12 GB 20 GB 182 GB

ProcessingProduction

Shasta Tech., SHASTA_0032089

Conductive Tech., CT_0052893

Pharmatech Inc., PHARM0005271

LifeScan, Inc., LSS00311833

Total Files 402,086

62%

6%

Database:

Last Update: 3/29/13

Page 19: Traversing the triangle

Clarity of Expectations

Page 20: Traversing the triangle

Managing and Monitoring Relationships

In the Bermuda Triangle of E-Discovery

Page 21: Traversing the triangle

Counsel

Client

Service Provider

Transparent Process

Page 22: Traversing the triangle

CounselService Provider

Client

Exclusion Process

Page 23: Traversing the triangle

CounselVendor

Client

Attorney-Client Privilege

Communication Not Privileged

Page 24: Traversing the triangle

Sample Language for Extending Privilege

• All work performed by Kroll Ontrack on this project will be conducted at the direction of and under the supervision of {Law Firm} in their capacity as counsel to {End-Client} on the {Name of Matter} and as such, all communications and documents exchanged between Kroll Ontrack, {Law Firm} and {End-Client} shall be protected by the attorney-client privilege and work product doctrine.

Page 25: Traversing the triangle

Communication Infrastructure

Counsel

Client

Service Provider

Page 26: Traversing the triangle

Relationship Protocol

Counsel

Client

Service Provider

Page 27: Traversing the triangle

Cost Effective CommunicationCost Effective Communication

Client

Service Provider

Counsel

Page 28: Traversing the triangle

CounselVendor

Client

Verification of Data

Quality Assurance Process

Page 29: Traversing the triangle

Keys to Success!

Trust, but Verify

Define Accountability

Competence & Redundancy

Group buy-in

Active Communication of Process

Evolve with the Data

Page 30: Traversing the triangle

Questions?

Page 31: Traversing the triangle

Thank You

Lael Andara | Partner | Ropers Majeski Kohn [email protected]

Eric Robinson | Solutions Architect | Kroll [email protected]

David Kearney | Director of Technology Services | Cohen & [email protected]

Traversing ‘The Triangle’