This Page

has been moved to new address

The eDiscovery Paradigm Shift

Sorry for inconvenience...

Redirection provided by Blogger to WordPress Migration Service
----------------------------------------------------- Blogger Template Style Name: Snapshot: Madder Designer: Dave Shea URL: mezzoblue.com / brightcreative.com Date: 27 Feb 2004 ------------------------------------------------------ */ /* -- basic html elements -- */ body {padding: 0; margin: 0; font: 75% Helvetica, Arial, sans-serif; color: #474B4E; background: #fff; text-align: center;} a {color: #DD6599; font-weight: bold; text-decoration: none;} a:visited {color: #D6A0B6;} a:hover {text-decoration: underline; color: #FD0570;} h1 {margin: 0; color: #7B8186; font-size: 1.5em; text-transform: lowercase;} h1 a {color: #7B8186;} h2, #comments h4 {font-size: 1em; margin: 2em 0 0 0; color: #7B8186; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px;} @media all { h3 { font-size: 1em; margin: 2em 0 0 0; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px; } } @media handheld { h3 { background:none; } } h4, h5 {font-size: 0.9em; text-transform: lowercase; letter-spacing: 2px;} h5 {color: #7B8186;} h6 {font-size: 0.8em; text-transform: uppercase; letter-spacing: 2px;} p {margin: 0 0 1em 0;} img, form {border: 0; margin: 0;} /* -- layout -- */ @media all { #content { width: 700px; margin: 0 auto; text-align: left; background: #fff url(http://www.blogblog.com/snapshot/bg-body.gif) 0 0 repeat-y;} } #header { background: #D8DADC url(http://www.blogblog.com/snapshot/bg-headerdiv.gif) 0 0 repeat-y; } #header div { background: transparent url(http://www.blogblog.com/snapshot/header-01.gif) bottom left no-repeat; } #main { line-height: 1.4; float: left; padding: 10px 12px; border-top: solid 1px #fff; width: 428px; /* Tantek hack - http://www.tantek.com/CSS/Examples/boxmodelhack.html */ voice-family: "\"}\""; voice-family: inherit; width: 404px; } } @media handheld { #content { width: 90%; } #header { background: #D8DADC; } #header div { background: none; } #main { float: none; width: 100%; } } /* IE5 hack */ #main {} @media all { #sidebar { margin-left: 428px; border-top: solid 1px #fff; padding: 4px 0 0 7px; background: #fff url(http://www.blogblog.com/snapshot/bg-sidebar.gif) 1px 0 no-repeat; } #footer { clear: both; background: #E9EAEB url(http://www.blogblog.com/snapshot/bg-footer.gif) bottom left no-repeat; border-top: solid 1px #fff; } } @media handheld { #sidebar { margin: 0 0 0 0; background: #fff; } #footer { background: #E9EAEB; } } /* -- header style -- */ #header h1 {padding: 12px 0 92px 4px; width: 557px; line-height: 1;} /* -- content area style -- */ #main {line-height: 1.4;} h3.post-title {font-size: 1.2em; margin-bottom: 0;} h3.post-title a {color: #C4663B;} .post {clear: both; margin-bottom: 4em;} .post-footer em {color: #B4BABE; font-style: normal; float: left;} .post-footer .comment-link {float: right;} #main img {border: solid 1px #E3E4E4; padding: 2px; background: #fff;} .deleted-comment {font-style:italic;color:gray;} /* -- sidebar style -- */ @media all { #sidebar #description { border: solid 1px #F3B89D; padding: 10px 17px; color: #C4663B; background: #FFD1BC url(http://www.blogblog.com/snapshot/bg-profile.gif); font-size: 1.2em; font-weight: bold; line-height: 0.9; margin: 0 0 0 -6px; } } @media handheld { #sidebar #description { background: #FFD1BC; } } #sidebar h2 {font-size: 1.3em; margin: 1.3em 0 0.5em 0;} #sidebar dl {margin: 0 0 10px 0;} #sidebar ul {list-style: none; margin: 0; padding: 0;} #sidebar li {padding-bottom: 5px; line-height: 0.9;} #profile-container {color: #7B8186;} #profile-container img {border: solid 1px #7C78B5; padding: 4px 4px 8px 4px; margin: 0 10px 1em 0; float: left;} .archive-list {margin-bottom: 2em;} #powered-by {margin: 10px auto 20px auto;} /* -- sidebar style -- */ #footer p {margin: 0; padding: 12px 8px; font-size: 0.9em;} #footer hr {display: none;} /* Feeds ----------------------------------------------- */ #blogfeeds { } #postfeeds { }

Friday, July 13, 2012

Five Initial Steps to Meet the Governance, Risk and Compliance Obligations Brought on by Today's Big Data File Stores

The accelerating increase in the amount of unstructured Electronically Stored Information (ESI) is leaving IT organizations struggling with how to store and manage all of this new information. Aside from just providing the underlying storage infrastructure to host this amount of data, companies are also faced with the task of properly managing their Big Data file stores to meet existing governance, risk and compliance obligations. To do so, there are five steps they can take now to position their organization to meet them.


According to a 2010
report by IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007. The size of the digital universe this year will be tenfold what it was just five years earlier. According to this same IDC report, the volume of unstructured ESI is expected to grow at over 60% CAGR (Compounded Annual Growth Rate).

According to Forrester Research and as
reported in an article that appeared on Forbes website last week:
  • The average organization will grow their data by 50 percent in the coming year
  • Overall corporate data will grow by a staggering 94 percent
  • Database systems will grow by 97 percent
  • Server backups for disaster recovery and continuity will expand by 89 percent
Overseeing the expansion of storage space and ensuring that the data is protected has become a minor part of the overall task of Big Data file storage and management. Business stakeholders and the Information Technology (IT) organizations from enterprises of all sizes and across all industries must now face a list of Governance, Risk and Compliance (GRC) regulations to which they have to legally comply or face potentially fatal financial penalties to the enterprise. 

The most obvious laws to which they are subject include:
  • Sarbanes-Oxley (SOX)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Gramm-Leach-Bliley (GLBA)
  • Federal Information Security Management Act (FISMA)
  • Consumer Information Protection Laws
  • Federal Rules of Civil Procedure (FRCP)

Further, the list of new regulations is growing. The passage of The Patient Protection and Affordable Care Act (PPACA) will result in the US Government adding 159 new agencies, programs, and bureaucracies to assist with the compliance of over 12,000 pages of new regulations. Over the past ten years, in response to the threat of international terrorism, the US Department of Homeland Security (DHS) has added hundreds of new regulations. Finally, cyber terrorism, including acts of deliberate, large-scale disruption of enterprise computer networks, is now a reality that all businesses must face.

In the face of this, Big Data file storage and management vendors, along with the associated industry consultants, have developed a list of hardware and software requirements and associated value propositions to help enterprise buyers decide which Big Data file storage and management platforms to purchase.

But before they buy, there are five steps that buyers should take first to ensure they are prepared to meet the governance, risk and compliance obligations brought on by today's Big Data file stores:
  • Internal Collaboration: File management and Governance, Risk and Compliance (GRC) requirements affect business stakeholders from the boardroom to IT to the manufacturing floor and loading dock to the accounting office. The development of cross functional workgroups and the promotion of internal collaboration between functional experts is the key to successfully identifying, understanding and addressing all of the requirements and issues involved in Big Data file management across the entire enterprise.
  • Network Architecture Planning:  Over the past 25 years, enterprise architectures grew with little or no planning resulting in wasteful redundancy and little or no access to all the enterprise data as may be required to comply with today’s GRC requirements. The advent of the Internet and now cloud computing has brought this decades of poorly planned networks to light resulting in them become more of an enterprise liability than an asset. The time is now for IT to hit the restart button and explore new options such as virtualization, hybrid cloud architectures and the use of cloud service providers (CSPs) that enable them to better leverage, manage and optimize their existing infrastructure..
  • Security:  The introduction and proliferation of portable storage devices, Wireless Internet, mobile computing devices, enterprise Software-as-as-Service (SaaS) applications, cloud storage, blogs and social media such as Facebook, LinkedIn and Twitter, data theft and cyber attacks are a real issue for which many (and arguably most) companies do not have a good answer. Now is the time for IT to take a serious look at their internal file access policies and move as quickly as possible to address any existing shortcomings.
  • Data Retention Policy Development and Implementation: Sarbanes-Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA) and the Federal Rules of Civil Procedure (FRCP) all have very specific data retention guidelines for what types of ESI data an enterprise has to keep and how long to keep it.  Enterprises must investigate and document these requirements, development data retention policies and acquire the appropriate software to ensure compliance.
  • Technology Vendors and Consulting Partners: Business stakeholders and IT management may be overwhelmed with the task of addressing the issues of successfully meeting the GRC obligations of big file storage and management. If this is the case, reach out to the hardware and software vendor community and askhow their solutions support these issues. If required, engage the services of vendor independent consulting partners to act as trusted advisors to assist in the successful navigation of the required cultural transitions and the acquisition of the best technology platforms.

The accelerating increase in the amount of unstructured Electronically Stored Information (ESI) is putting IT organizations on the defensive as they struggle to figure out how to store and manage all of this new information. However, overseeing the expansion of storage space and ensuring that appropriate backups are completed has become a minor part of the overall task of big file storage and management.

Rather business stakeholders and IT staff need to act now to first bring their infrastructure under control so they can get in front of the growing list of GRC regulations to which they are subject. By following the five steps outlined above, enterprises will be in a position so that when they purchase a product, they will have a good grasp of what their true enterprise challenges are and have a high probability of bringing in a product that addresses them.

Labels: , , , , , , , , , , , ,

Wednesday, July 11, 2012

BeyondRecognition Ranked as Top Disruptive eDiscovery Technology to Watch in 2012


As a followup to eDSG's list of the Top Five eDiscovery Technologies to Watch in 2012,  today's blog post is a more detailed overview of BeyondRecognition, the image processing technology that I ranked as the number one eDiscovery technology to watch in 2012.

This past week, I had the opportunity to spend some time with John Martin, founder of BeyondRecognition ("BR") and long-time document conversion and litigation technology expert. First of all, to put BR's new technology into perspective, not much has changed in Optical Character Recognition (OCR) for over 30 years.  And, although once you begin to understand what John has created, you will realize that it is much more than just OCR, OCR is a good place to start the comparison.

OCR software electronically translates scanned images of handwritten, typewritten or printed text into machine-encoded text. This software is used to convert books and documents into electronic files, to computerize record-keeping systems in offices and to publish text onto websites.  And, with the accelerating rush to Electronically Stored Information (ESI), it would be easy to think that there just isn't that much paper to convert.  However, there are literally trillions of existing documents that will someday need to be converted with billions more yet to be created. The legal, healthcare, mortgage and government markets are currently the prime offenders for creating more paper.  In fact, in the five years to 2012, revenue for the Optical Character-Recognition Software industry is expected to increase at an annualized rate of 1.6% to $386.9 million.

And,  OCR software developers have not really upgraded OCR software for a very long time.  State-of-the-art today is not much different that it was 5-10 years ago.  That's why John and BR have the opportunity to disrupt the market with a completely new approach to the challenge of converting non-digital documents to searchable ESI.

BeyondRecognition Technology

BR’s core technology includes image-based (NOT text-based) document clustering, individual glyph (i.e. character) clustering for highly effective cascading text conversion, error correction, and document-type-specific data extraction functionality with accuracy rivaling or exceeding human coding.

Traditional Old Character Recognition (“OCR”) analyzes each glyph or character in a linear fashion, treating each new glyph as a new issue, and optimizes images for conversion purposes at the page level. By contrast, BR clusters similar glyphs prior to trying to convert them to textual characters, optimizing the portion of the images around each glyph, and then converts the glyphs to characters using the most complete glyph from each glyph cluster. BR then provides cascading or persistent error correction in which characters with low confidence conversion scores are edited in words that failed spell checking. Correcting a single word not only corrects all the instances of that sequence of glyphs but corrects other words where the same glyph was used so long as the correction results in a word that is in the word spelling dictionary.
This cascading effect permits editors to correct hundreds of thousands of words with a single keystroke or mouse click – and the error correction is persistent because future occurrences of that glyph will also be converted correctly.

Example of Cascading Corrections

In one example from a mortgage loan file project, correcting the word “thc” with one keystroke resulted in correcting 142,121 instances of the word “the” but also had the cascading effect of correcting yet others, resulting in correcting a total of 149,520 instances of incorrectly spelled words.

Here just a few of the words impacted by the cascading effect in that example:

“cducation” corrected to  “education” (1209)
 “Codc” to “Code” (744)
“qucstion” to “question” (702)

Example of Reconstituting Unreadable Text

Following is an example of how BR is able to optimize individual glyphs and essentially reconstitute a page image of old court opinions using the “best” glyph from individual glyph clusters to produce the most accurate text conversion.











BR’s success in converting previously “unreadable” images on things like decades-old court opinions and computer-output microfiche (“COM”) makes it tempting to pigeon hole BR as just an advanced text recognition company, but the functionality doesn’t stop there.

Potential to Compete with Off-shore Coding

By clustering like documents based on image similarity and then enabling users to rapidly build data extraction rules for each type or class of record, including location-based rules or rules based on non-textual elements, BR can create data extraction fields or metadata elements for each of those document types. The resulting index of specific types of data elements rivals or exceeds human coding.  And, that may be the real disruptive feature of BR as it is going to provide a much more accurate and financially compelling alternative to off-shore coding.

Summary and Comments

Not much has changed in Optical Character Recognition (OCR) for over 30 years.  However, BeyondRecognition is about to change that with a new image processing technology that is going to be very disruptive to the legal market and many other market that have to convert and code documents.  And that why  I ranked BeyondRecognition as the number one eDiscovery technology to watch in 2012.

Labels: , , , ,

Tuesday, July 10, 2012

Top Five eDiscovery Technologies to Watch in 2012

Over the past 12 months I have had the unique opportunity to seek out and review over 100 eDiscovery technologies.  As a result, I have had the pleasure of being exposed to some exciting new technologies that will have a disruptive impact on the eDiscovery market in the second half of 2012.

With over 100 technologies to choose from, culling the list down was not an easy task.  Therefore, I had to rely upon some amount objective criteria such as platform technology stack and supported environments along with a heavy dose of my subjective opinion in regards to how disruptive a technology could be within the paradigm shift of the eDiscovery market.

The objective, more technical criteria was easy.  At least in regards to 4 of my 5 choices.  The subjective criteria was a bit more complicated as I took into consideration criteria such as pricing, positioning, deployment flexibility, management team and uniqueness.

Following are my choices for the Top Five eDiscovery Technologies to Watch in 2012:


BeyondRecognition, BeyondRecognition

Optical Character Recognition (OCR), a foundational technology for litigation services and eDiscovery hasn't changed much in 30 years.  And, vendors really haven't worked on making it more accurate or added any significant new bells and whistles.  Therefore, after I had the opportunity to spend some time with John Martin from BeyondRecognition and review his new glyph based image processing technology designed to replace OCR and more, it was an easy decision to rank Beyond Recognition as the technology that will have the most disruptive impact on the eDiscovery market in the second half of 2012.

With c
haracter and word identification and conversion accuracy at 99.5%+, single instance character and word correction, Logical Document Determination (LDD), document type classification, duplication document detection, database field indexing and a cloud based scalable architecture that can process terabytes of data per day, BeyondRecognition will most definitely have a disruptive impact on the eDiscovery market and any other markets that require large volumes of text based materials to be processed and coded.  For more information about BeyondRecognition, please visit: http://www.beyondrecognition.net/BeyondRecognition,_LLC/Overview.html.


X1 Social Discovery, X1 Discovery

With the rapid proliferation of social media, I predict there are going to be very few eDiscovery and Information Governance projects going forward that don't include potential evidence from social media sources such as Facebook, LinkedIn and Twitter.  Therefore, I included
X1 Social Discovery from X1 Discovery as one of my top five eDiscovery technologies to watch in 2012.

X1 Social Discovery™ is the industry's first investigative solution specifically designed to enable eDiscovery and computer forensics professionals to effectively address social media content and web content, in one single interface. X1 Social Discovery  provides for a powerful platform to collect, authenticate, search, review and produce electronically stored information (ESI) from Facebook, Twitter, LinkedIn and other web sources.  For more information about X1 Social Discovery , please visit: http://x1discovery.com/social_discovery.html.



X1 Rapid Discovery, X1 Discovery

With the accelerating volume of Electronically Stored Information (ESI) in the cloud, I predict there are going to be more and more eDiscovery and Information Governance projects going forward that require potential evidence to be extracted from the cloud and possibly even processed in the cloud.  Therefore, I included 
X1 Rapid Discovery from X1 Discovery as one of my top five eDiscovery technologies to watch in 2012.

With X1 Rapid Discovery, organizations can quickly access, search, triage and collect their data in their existing cloud environments, without having to first export that data; thereby transforming how organizations address the challenges of search, collection and analysis of cloud-based data. While other eDiscovery products require migrating or even shipping data to the vendor tools, X1 Rapid Discovery  is a hardware-independent software solution that uniquely installs and operates on demand where your data currently resides. For more information about X1 Rapid Discovery , please visit:  http://x1discovery.com/rapid_discovery.html.


TunnelVision, Mindseye Solutions

The Early Case Assessment (ECA) tool landscape has changed dramatically over the past 12 months.  New tools that cover a larger percentage of the
EDRM model and are built upon newer more flexible technologies have emerged with aggressive new pricing models. Therefore, I included TunnelVision from Mindseye Solutions, a representative of those new ECA platforms, as one of my top five eDiscovery technologies to watch in 2012. 

TunnelVision was purpose-built by long time eDiscovery industry experts to address the challenges that organizations are facing when supporting eDiscovery and Information Governance. The technology is a simple yet flexible platform, designed to scale, and delivers full transparency. TunnelVision carries a predictable cost model and helps in managing risk, identifying exposure, and eliminating wasted time throughout the process. For more information about TunnelVision from Mindseye, please visit:
http://www.mindseyesolutions.com/.


Equivio Zoom, Equivio

Predictive coding or Technology Assisted Review (TAR) has captured the imagination of the industry in the first half of 2012.  As such, I wanted to include predictive coding technology in my list of 
top five eDiscovery technologies to watch in 2012 and therefore I chose Equivio Zoom from Equivio.

Equivio develops text analysis software for eDiscovery. Users include the DoJ, the FTC, KPMG, Deloitte, plus hundreds of law firms and corporations. Equivio offers Zoom, an integrated web platform for analytics and predictive coding. Zoom organizes collections of documents in meaningful ways. So you can zoom right in and find out what’s interesting, notable and unique. For more information about Equivio Zoom from Equivio, please visit: http://www.equivio.com/.



Summary and Comments

With over 100 technologies to choose from, culling the list down was not an easy task.  Therefore, I had to rely upon some amount objective criteria such as platform technology stack and supported environments along with a heavy dose of my subjective opinion in regards to how disruptive a technology could be within the paradigm shift of the eDiscovery market. BeyondRecognition, X1 Social Discovery, X1 Rapid Discovery,  TunnelVision and Equivio Zoom definitely met these criteria.

It will be interesting to review my list of Top Five eDiscovery Technologies to Watch in 2012 this time next year when I choose another list.  Some on the 2012 list will have had a big impact and some will not.  However, one thing is for sure, each of these technologies represents a major step forward for litigation and eDiscovery technology.


Additional Product Reviews

Over the coming weeks, I will be posting additional product reviews for each of the technologies listed in the eDSG To
p Five eDiscovery Technologies to Watch in 2012.



Labels: , , , , , , , ,

Tuesday, June 26, 2012

The Best Place to Perform Technology Assisted Review (TAR)

The resulsts of eDiscovery Solutions Group (eDSG) Weekly Survey on "Where is your Technology Assisted Review (TAR) done?" are in and they reveal that 43% of the respondents are outsourcing  their Technology Assisted Review (TAR) to third party document review providers.  These results seem to be somewhat contradictory to the prime objective and overall value proposition of the Legal Services Outsourcing (LSO) or Legal Process Outsourcing (LPO) vendors to provide less expensive manpower for labor intensive tasks such as document review.

However, according to a report on the Top Ten Trends in Legal Outsourcing for 2012 by Fronterion LLC,  legal technology platforms (such as TAR) will be increasingly bundled together with traditional LPO offerings, combing two of the most important trends shaping  the legal profession today.  This means using software systems as well as low cost human labor to provide  cheaper  and more efficient legal services.

This trend seems to actually have been evolving for years as legacy LPO players have long been utilizing software tools and techniques during the document review processes including: document clustering, email thread management and keyword and concept search to cull and organize the documents in order to increase the speed and reduce the overall cost of review.  Adding predictive coding to mix as a way to reduce the cost even further seems like a logical progression in the evolution of the LPO as they strive to maintain their margins.

The percentage of the respondents  that chose something other than an LSO for where they send their Technology Assisted Review (TAR) also provided some interesting results:
  • Outside Counsel (14%)
  • Internal as part of Document Review Software (14%)
  • Internal as separate Technology Assisted Review (TAR) Software (29%)

The fact that 14% of the respondants chose Outside Counsel for where they send their Technology Assisted Review (TAR) indicates that although the eDiscovery market is going through a paradigm shift with corporate legal departments bringing eDiscovery services in-house, there are still some legal departments relying on their outside counsel for eDiscovery services.  An interesting question for a future eDSG poll would be whether or not legal departments send their TAR to outside counsel because their outside counsel is proficient at TAR or because they send all of their eDiscovery work to outside counsel.   It would also be telling to investigate whether or not these outside counsel are performing the TAR services internally or sub-contracting them to an LPO or LSO.

The results of the eDSG 2012 Survey of the General Counsel from the Global 250 indicated that 86% of the respondants send their document review to either outside counsel or an LPO.   However, the survey also revealed that 75% of the respondants were frustrated that neither outside counsel nor legacy LPOs were providing adequate support for eDiscovery.  This survey also revealed that 80% of general counsel from the global 250 were frustrated with having to deal with software vendors.  This statistic leads into the last two facts from the eDSG weekly poll on where respondents are sending TAR.  The poll reveals that 43% are performing TAR internally which indicates that they are having to "deal" with software vendors.  The eDSG weekly poll is open to anyone that wants to vote and therefore the respondants are not necessarily general counsel from the global 250.  In fact, I would venture to say that very few is any of the respondants to this week's poll were general counsel.  However, it is still significant and shows a trend that 43% of the respondants indicated that they are performing TAR internally.


The fact that 14% of the respondents chose Internal as part of Document Review Software for where they send their Technology Assisted Review (TAR) indicates that some of the document review vendors have successfully integrated TAR into their review platforms.

However, the fact that 29% of the respondants chose Internal as separate Technology Assisted Review (TAR) Software for where they send their Technology Assisted Review (TAR) indicates that eDiscovery users are not yet comfortable with TAR and may not be ready to use it as part of their stand document review process. However, this statistic is significant enough to indicate that eDiscovery users understand the value of TAR and are therefore using in those situations where it satisfies the technical and legal requirements.

The resulsts of eDiscovery Solutions Group (eDSG) Weekly Survey on "Where is your Technology Assisted Review (TAR) done?" reveals that users within the eDiscovery market is still trying to figure out when, where an how to best utilize Technology Assisted Review (TAR).  Complicated by the ongoing paradigm shift of responsibility for eDiscovery services moving to the legal deparments and exaserbated by the evolution of both LPOs and outside counsel trying to refine their business models, TAR users should take the time to understand their internal requirements and then investigate the best approach, partners and place to perform TAR.  It may not be as straight forward to they think.

Click Here to view the results of the 
eDiscovery Solutions Group (eDSG) Weekly Survey on "Where is your Technology Assisted Review (TAR) done?".


Labels: , , , , , , , , ,

Wednesday, June 20, 2012

Percieved Value of Technology Assisted Review (TAR)

eDiscovery Solutions Group (eDSG) ran a public poll the week of June 11, 2012 asking respondents to vote on "The Number One Reason for Using Technology Assisted Review (TAR)".  The poll was open for 7 days and there were 476 responses.

eDSG marketed this poll to the eDiscovery and legal community through specific and targeted LinkedIn groups such as The Computer Assisted eDiscovery GroupThe eDiscovery Solutions Group, The Early Case Assessment Association and via Twitter at @eDiscoveryGroup

Respondents did not have to identify their position within the eDiscovery market and were able to vote more than once.
The results of the poll are as follows:

Check the Accuracy of Human Review = 14%
Reduce the Document Set for Human Review = 29%
Replace Human Reviewers = 57%

To see a graphic representation of this poll and of all eDSG polls, please go to the eDSG website: http://www.ediscoverysolutionsgroup.com/index-8.html.

Comment and Analysis on Results

Most of the recent interest with Technology Assisted Review (TAR) or Predictive Coding, as it is sometimes called, stems from Da Silva Moore (2012 U.S. Dist. LEXIS 23350 (S.D.N.Y. Feb. 24, 2012)), a decision rendered by Magistrate Judge Andrew Peck and confirmed by U.S. District Judge Andrew Carter (11 Civ. 1279 (ALC)(AJP)).  However, TAR is not new and its value and reliability has been studied for years.

As an example, in a 2009 study published in the Journal of the American Society for Information Science and Technology by Roitblat, Kershaw and Oot, titled, "Document Categorization in Legal Electronic Discovery: Computer Classification vs. Manual Review", two TAR systems each agreed with an original human review on about 83% of the documents reviewed. By comparison, two new human teams only agreed on about 73% of the documents.   As a result, the Roitblat, Kershaw and Oot study concluded that TAR was, "no worse than using human review."

Other studies have also addressed the “myth” that human document review is somehow inherently more reliable than could be obtained with TAR (e.g., Grossman & Cormack, 2011; Baron, et al., 2009).    As such, the evidence has been clear for some time that TAR can be very effective.

However,  in an industry known for evolving and embracing new technology at the pace of a snail, with a built in prejudice and comfort level for human review,  I am not convinced that the market has agreed upon the best practice for using TAR.  As an example, I have witnessed users utilizing TAR to cull down very large data sets with statistical "hit rate" settings in the high 90%, leaving the "important" review work to humans.  I have also seen users utilizing TAR to "spot check" the accuracy of human reviewers with the necessary "rework" going back to a different set of human reviewers.   During this early adaptor phase in the evolution of TAR, neither of the uses that I sited for TAR are necessarily wrong.  I just believe that the research and evidence already justifies the more productive and financially rewarding use of TAR is to replace human reviewers.

Given all of this, I was actually very pleased to see that 57% of the voters in this eDSG poll agreed that  the number one reason for using Technology Assisted Review (TAR) was to replace human reviewers.  However, more in line with what I would have thought, 43% of the respondants voted otherwise. I would suspect that these are the mainstream buyers and the laggards (see Crossing the Chasm).  Or maybe these were the voters that own and operate offshore document review organizations?

In any case, maybe TAR is going to be the "tipping point" technology that finally drives the legal industry to explore and possibly embrace to the value of technology?  Let's hope so.

Labels: , , , , ,

Tuesday, March 20, 2012

eDiscovery Will Follow the Cloud Computing Boom

The National Inflation Association (NIA) reported this week that  after years of rumors about cloud computing going mainstream around the world, the cloud computing boom is now finally here. They predict that by the year 2013, cloud computing could become a bigger boom on Wall Street than the dot-com boom was in the year 2000. Cloud computing is currently a $74 billion industry that accounts for 3% of global IT spending, but in 2013 cloud computing is expected to become a $150 billion market.

The NAI further stated that 2012 will be remembered as the year in which cloud computing started to become widely adopted worldwide. Cloud computing is expected to create 14 million new jobs globally by year 2015. In the consumer space, Gartner is predicting that cloud services will be on 90% of personal consumer devices by year 2015 so that consumers can store, connect, stream, and synchronize content across multiple platforms at different locations.

Industry analyst are heralding the explosion in the Cloud computing market as great news for the Cloud Service Providers (CSP).  According to a forecast from independent technology analyst firm Ovum, the global public cloud services market will more than triple in size over the next five years to reach revenue of $66 billion in 2016 and the market will see a compound annual growth rate (CAGR) of 29.4 percent from the $18 billion it reached at the end of 2011.  Ovum goes on to report that in terms of the cloud computing service lines, Software-as-a-Service (SaaS) will shrink from 87 percent of the market in 2011 to 62 percent in 2016 due to the rise of infrastructure as a service (IaaS) and platform as a service (PaaS), which will grow from 9 percent and 5 percent, respectively, to 23 percent and 16 percent by the end of the forecast period.

And, there are numerous other studies by most of the major international industry analysts that predict a dramatic increase in the size of just about everything having to do with Cloud computing.

However, it is my impression that the inevitable and potentially dramatic increase in the demand for eDiscovery and Information Governance due to this explosion of the Cloud computing market, is flying under the radar of most analysts.  eDiscovery and Information Governance professionals know full well that there is a linear and possibly an expontial relationship between the volume of Electronically Stored Information (ESI) and the demands and cost of identification, collection, analysis, processing and production of that ESI.

In 2011, Gartner predicted that the eDiscovery market would reach $1.5 Billion in revenue by 2013.  And, depending upon which analyst you follow (and believe), the size of the Information Governance market is anywhere from 2X to 10X the size of the eDiscovery market.  I believe that all of these forecasts are extremely low.

Further, a recent study by eDSG on "How Cloud Service Providers Support eDiscovery and Information Governance" as reported on this blog on March 7, 2012, indicated that 95% of  the Cloud Service Providers and 98% of the general counsel from the global 2000 (based on participation in the survey) did not have a plan for responding to eDiscovery and Information Governance requests for ESI residing in CSP facilities.

In summary, my prediction is that the explosion in the size of the Cloud computing market as reported by the National Inflation Association is really good news for any of the technology and service providers, along with their investors, that are planning to support eDiscovery and Information Governance in the Cloud.  As the name of this blog implies, the eDiscovery paradigm shift is underway and the demand of Cloud computing is only going to make that shift and the associated size of the market even bigger.

The full text of the press release by the National Inflation Association: http://www.marketwatch.com/story/cloud-computing-is-new-wall-street-boom-says-nia-2012-03-20

Labels: , , , , , , , , , ,

Wednesday, January 25, 2012

The Perfect Storm: eDiscovery and Cloud Service Providers

The market for Cloud Service Providers (CSPs) is very sunny.  Forrester Research predicted in a research report published earlier this year titled, “Sizing the Cloud” that the global cloud computing market would reach $241 billion in 2020 compared to $40.7 in 2010.  And, Gartner Predicts that the eDiscovery market will reach $1.5 Billion by 2013.  However, based upon the research that I have completed over the past sixty (60) days, Cloud Service Providers (CSPs) and their clients are ignoring eDiscovery as an important component of a standard cloud service offering.

I have some theories in regards to why this is the case:

CSPs DON'T UNDERSTAND eDISCOVERY

Over the pat five (5) years Cloud Service Providers (CSPs) have been busy focusing on their core offerings of Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS), honing their value propositions and trying to figure out how to differentiate themselves from the pack.  Overwhelmed with the rudimentary issues of what to offer and how to make a profit , eDiscovery has not been a requirement that has reached the road map of any CSPs that I have interviewed.

Most of the reasons behind this is the fact that eDiscovery is actually a "
latent pain" that the CSP's clients and prospects are not asking for (I will cover this in more detail in the next section).  However, part of the reason may be just plain semantics.  I have found that when you ask a CSP business development executive if their clients are asking about eDiscovery, the answer will be no.  However, if you change the question and ask if their clients are asking about information governance, compliance, business analytics or something even simpler like universal or federated search, the answer may be yes.  This subtle difference is confusing to most in the eDiscovery market and therefore it is no wonder that it is very confusing to the CSP market.As In indicated in my Blog post on September 15, 2011,titled, "Evolving from Information Governance to eDiscovery", I believe that eDiscovery is actually part of a larger market called information governance (IG).  And, as Sunil Soares, the Director of Information Governance within the IBM Software Group indicated in a blog post on April 11, 2011 titled, Why Information Governance is a Market, Not Just a Process, “information governance is like the blind man and the elephant. Depending on which part of the elephant you touch, people define information governance to include master data management, data stewardship, data quality management, metadata management, business glossaries, information lifecycle management and security and privacy.” 

I would actually include several other components as integral parts of IG in pursuit of my premise that if Gartner predicts that the eDiscovery market is going to reach $1.5 Billion by 2013, the information governance market is going to be many times this size.  Or, in other words, more than likely the largest  software and services market on the planet in the next five (5) years (Note that HP paid $11 Billion for Autonomy to play in the IG Market).

So, maybe CSPs need to think of eDiscovery as Information Governance and concentrate on the fact that information governance is potentially the single biggest market on the planet in the coming years?


CSP CLIENTS DON'T UNDERSTAND eDISCOVERY
Another interesting fact emerged from my recent study on eDiscovery in the CSP market.  It appears that most CSP enterprise clients don't understand eDiscovery.  Come to find out, a very high percentage of the standard CSP client base are actually "renegade" business units with global 2000 enterprises that were unhappy being held hostage by their IT organizations and decided to outsource their information management to a CSP.  Unless the business unit in question is the legal department (which is highly unlikely), the stakeholders within these units have no idea what eDiscovery or information governance is or would they know to even ask their CSP if it can be supported if the need were to present itself.

After further investigation into this market dynamic, the story actually gets even more interesting.  If one of these global 2000 enterprises is sued and is presented with a request to produce information (ESI) or some governance regulatory entity asks for proof of compliance, the request is normally handled by the General Counsel (GC) and legal department.  More than likely the first place the GC will go is to the IT department asking for its help in producing the requested data (Please note that most global 2000 enterprises are now relatively adept at the process of internal eDiscovery).  However, the GC may not even know to ask about the data (ESI) from the renegade business unit and if they do, the renegade business unit is not going to know how to comply with the request and their IT department is probably not going to help since they are no at all happy that they went to a CSP for IT services in the first place.  Given all of this, the business unit executives or the GC may call the CSP and ask for help.  However, since the CSP doesn't really understand eDiscovery, they aren't going to be much help.  Basically, at this point the entire eDiscvoery process can get pretty ugly.  The GC is under a legal obligation to respond (i.e. Federal Rules of Civil Procedure) under a fairly limited time frame with financial and other sanctions are real possibilities for non-compliance with the request.


THE PERFECT STORMSo, unfortunately, what I have determined to be the current status in the Cloud Service Provider (CSP) market is the perfect storm of neither the CSP or the CSP's client base understanding the need for eDiscovery.  However, there are solutions and there is hope.

THE ROADMAP FOR SUCCESS FOR CSPs
The roadmap to success for the CSPs is actually not that complicated.  CSPs need to get serious about providing eDiscovery and/or information governance as a component or their standard offering.

In a January 8, 2012 blog post titled, "Cloud Computing Architecture and eDiscovey", I stated that "It is within the Platform-as-a-Service (PaaS) layer where eDiscovery services belong.  In fact, this may be a good time to coin the term eDiscovery-as-a-Service (eDaaS)... And, since providing eDaaS as a standard option for any PaaS offering makes so much sense and could provide a first mover and key competitive advance for Cloud Service Providers (CSPs), I predict that we will see several eDaaS offerings before the end of 2012.  And, I also predict that once the eDaaS offerings hit the market, the legacy eDiscovery platform providers will be forced to re-evaluate the value propositions of their non eDaaS offerings in the cloud."

CSPs can contact me at cskamser@ediscoverysolutionsgroup.com for additional insight on which technology vendors currently have or are about to announce eDaaS offerings.

THE ROADMAP FOR SUCCESS FOR CSP CLIENTS
The roadmap to success for the CSP clients is also actually not that complicated.  First of all, enterprise business unit stakeholders need to add eDiscovery and Information Governance to  their list of requirements for the CSPs.  And, they need to seek out and collaborate with their legal and IT departments in regards to a plan to follow when an eDiscovery and/or compliance event occurs.  It just make sense and its not complicated.

Enterprise stakeholders that are contemplating or already working with a CSP can contact me at cskamser@ediscoverysolutionsgroup.com for additional insight on what to expect from their CSP and what best practices to follow when an eDiscovery and/or compliance event occurs.

CONCLUSION
Both the cloud and the eDiscovery / Information Governance trains have left the station and therefore it is no longer an option for either Cloud Service Providers or their clients to ignore the legal requirements and business benefits.  The current practices to address the issues of eDiscovery or Information Governance are ugly at best.  However, the roadmap for success is not that complicated.  And, the rewards for both the CSP and their clients is well worth the investment.

Labels: , , , , , , ,

Saturday, January 21, 2012

The Dangers of Do-It-Yourself eDiscovery: A Warning to Lawyers and Business Leaders.

The goal of eDiscovery is to acquire relevant electronically stored information (ESI) and admit relevant and useful ESI into evidence. While ESI may be used for other purposes, such depositions or settlement negotiations, if the ESI is not gathered properly, it will not be admissible into evidence. Such a result would waste both the time and cost expended to obtain the ESI. Lawyers should not gather ESI personally and the person who does the collection should be qualified to do such work. Otherwise, the ESI may not be admissible and significant damage may be done to a party’s case.

The Lawyer as a Witness. Lawyers who gather ESI directly face several dilemmas and dangers. One of the largest concerns is the lawyer becoming a witness in the case. American Bar Association Model Rule of Professional Conduct 3.7 prohibits the lawyer from acting as the lawyer in the case and being a necessary witness. Rule 3.7 states:

(a) A lawyer shall not act as advocate at a trial in which the lawyer is likely to be a necessary witness unless:
(1) the testimony relates to an uncontested issue;
(2) the testimony relates to the nature and value of legal services rendered in the case; or
(3) disqualification of the lawyer would work substantial hardship on the client.

(b) A lawyer may act as advocate in a trial in which another lawyer in the lawyer's firm is likely to be called as a witness unless precluded from doing so by Rule 1.7 or Rule 1.9.

The comment 2 to Rule 3.7 states:
The tribunal has proper objection when the trier of fact may be confused or misled by a lawyer serving as both advocate and witness. The opposing party has proper objection where the combination of roles may prejudice that party's rights in the litigation. A witness is required to testify on the basis of personal knowledge, while an advocate is expected to explain and comment on evidence given by others. It may not be clear whether a statement by an advocate-witness should be taken as proof or as an analysis of the proof.

In the D.C. Bar in Ethics Opinion No. 228 expanded upon the purpose of this rule:

Beyond the confusion that this combination of roles might create, the rule is justified on at least three other bases: (1) it is necessary to prevent the possibility that, in addressing the jury, the lawyer will appear to vouch for his own credibility; (2) it will prevent the difficult situation that occurs when an opposing counsel must cross-examine a lawyer-adversary and seek to impeach his credibility; and (3) the rule also will prevent the implication that the testifying lawyer is distorting the truth for his/her client’s benefit.

Citing Culebras Enterprises Corp. v. Rivera-Rios, 846 F.2d 94, 99 (1st Cir. 1988), citing Bottaro v. Hatton Associates, 680 F.2d 895, 897 (2d Cir. 1982); International Electronics v. Flanzer, 527 F.2d 1288, 1294 (2d Cir. 1975); MacArthur v. Bank of New York, 524 F. Supp. 1205, 1208 (S.D.N.Y. 1981).

Authentication of ESI. Any person who gathers ESI must be able to authenticate and lay a foundation for that ESI. “Authentication” simply means that the person called to admit the ESI must prove that the ESI is what he or she claims it is. That person must be able to lay a foundation for the ESI.

To authenticate the evidence, the person called to testify may need to establish the following, depending upon what is sought to be introduced and the issues raised:

How the ESI was gathered.
Where the ESI was stored.
Who had access to it.
Establish the chain-of-custody
Whether other ESI was also located.
Whether a thorough search was conducted.
Whether the ESI sought to be introduced was altered from its original state.
Other essential details.

Who should be entrusted with the responsibility to gather the ESI? Who should take the witness stand to testify at trial? Certainly, the law firm’s paralegal, secretary and investigator should not conduct the ESI search unless that individual is qualified to establish the above-listed details and will lay the appropriate foundation for introduction of the ESI.

When gathering evidence it is usually not clear whether the evidence will be challenged when the party seeks to introduce it. Thus, the evidence should be gathered in a thoughtful manner that will withstand future challenges.

If ESI is gathered improperly and a party is unable to lay an appropriate foundation to authenticate the ESI, that evidence will not be admitted into evidence. This could be devastating to the case, depending on how critical the ESI was.

Just as experts are hired to provide opinions and establish essential facts, experts should be used to gather ESI. Ideally, the expert will have both technical are needed to search for, gather and introduce ESI.

The person who gathers ESI should also be a good witness. Parties must generally take witnesses as they come. There is very little control over who witnessed particular facts. However, when gathering evidence, parties are given the opportunity to select the witness. So, there should be some assurance that the person who gathers ESI will be a competent witness who can be depended upon. This witness may end up being the critical witness in the case.

Do-It-Yourself eDiscovery Software Tools. Some eDiscovery software tools are marketed directly to lawyers and this is clearly a terrible idea. A lawyer should not gather ESI if he wants to remain the attorney in the case or introduce the ESI into evidence. If the lawyer chooses to gather ESI, he may even be committing malpractice. Do-it-yourself software tools were intended to reduce the cost of eDiscovery and place direct control over the ESI in the hands of lawyers and business leaders. However, they may have unintended consequences.

The lawyer cannot use these tools to gather ESI or she may be disqualified as the lawyer in the case. Only a person qualified to testify at trial should use these tools to gather ESI. Ideally, this person would be an expert.
Thought must be given to who and how ESI should be gathered before it is obtained. A little bit of caution early will be rewarded later.



Labels: , , , , , , , , , ,

Monday, December 26, 2011

Information Governance and eDiscovery Trends for 2012

2011 has been a transitionary year for information governance and eDiscovery.  Enterprises and governments worldwide have had to come to grips with the sudden acceleration of the use of social media, cloud computing, mobile devices and the resulting explosion in the volume of Electronically Stored Information (ESI).

Some are predicting the end of email in favor ot texting, Twitter and other social media electronic communications.  There are over 100 million users on Twitter each day with 35% utilizing a mobile device.  Facebook now has over 800 million users with 74% outside the United States and 350 million on mobile devices.  There are also over 100 million LinkedIn users worldwide as business social media and the assocication collaboration and communications is now required as a fundamental marketing tool for any serious business player.  Click Here for a more detailed graphic overview of the the growth of social media from the Search Engine Journal.

In addition to social meida, the fundamental infrastructure matured in 2011 to support more serious cloud computing.  Enterprises worldwide began to realize the dramatic cost benefits and potential business benefits of cloud computing.  As a result they gave serious consideration to private cloud implementations and are becoming more comfortable with moving some ESI to public Cloud Service Providers (CSPs) such as Amazon and Rackspace.  Microsoft launched Office360 to enable users to access the Microsoft Office Suite of products as Software-as-a-Service (SaaS) removing the expensive and time consuming software update dance that we all dread.  And, late in 2010, Apple released the iCloud platform for consumer cloud storage and set the stage for literally millions of iPhone, iTouch and Mac users to begin storing their pictures and other personal data in the cloud.

For anyone involved in the world of Information Technology (IT) whether as a user or a technologist, 2011 was definitely an exciting year.  For those of us in the information governance and eDiscovery business, 2011 marked a turning point, both literally and conceptually, for the monitoring, indentification, collection, processing, review and production of electronic evidence.

Is it no longer just an interesting discussion at the local pub to talk about the eventuality of social media as a source of evidence.  There were already close to 1,000 cases in 2011 where the judge issued a written opinion that mentioned social media. Likewise, information governance and eDiscovery in the cloud is longer just an interesting breakout session at tradehows to fill up your 'dance card".  Harvesting ESI from the cloud for the purpose of eDiscovery was a real issue in 2011 and therefore anyone that is serious about eDiscovery from a process, legal and technology standpoint, had better start to pay attention.

Given all of this (and more that I have not even mentioned), 2012 is going to be a banner year for changes in information governance and eDiscovery.  Following are my predictions:

Information Governance and eDiscovery Will Move to the Cloud
As more and more ESI moves to the cloud, the requirement to harvest this ESI "from the cloud" will also continue to grow.  However, there will be a tremendous amount of confusion in regards to exactly what information governance and eDiscovery in the cloud means.  Most, if not all, of the seroius technology vendors will announce that they are cloud ready or work in the cloud.  However, in most cases, this will mean that they are using the same old legacy technology and harvesting data "from the cloud" and processing it the same old way they have been processing ESI and paper for years.  Some of these vendors will have their own data centers and offer up information governance and eDiscovery as as Service.   However, this is nothing new.  The real change that we will witness in 2012 will be virtual technology (not hardware based) that enables users to move information governance and eDiscovery solutions/platforms to the cloud ESI and collects it and processes it in the cloud where it resides.  Physical location will no longer be an issue.  Collection and moving massive amounts of data will no longer be an issue.  The salability of hardward solutions will no longer be an issue.  Staging information governance and eDiscovery respositories in third party service provider data centers will no longer be required.

Enterprises will be able to move virtual information governance and eDiscovery solutions around their networks and private clouds as required to collect and process ESI where it resides. Cloud Service Providers (CSPs) will provide information governance and eDiscovery solutions as part of their standard IaaS and PaaS technology stacks.   Early Case Assessment (ECA) is going to take on a whole new meaning.  This approach is a major paradigm shift in the entire concept of how information governance and eDiscovery should work.  2012 is going to be an exciting year for information governance and eDiscovery in the cloud.

Semantic Search will Go Mainstream
The mystical world of semantic search and natural language processing technology will finally go mainstream in 2012.  New Information governance and eDiscovery technology vendors will emerge that are utilizing this technology as the foundation of their offerings or have seamlessly integrated this technology into their platforms.  Litigators will begin to understand the value of semantic search, courts will begin to accept the results and users will begin to demand its use.  Before the end of 2012, the industry may even recognize the term "Lucene".

Predictive Coding will Go Mainstream
Just like the mystical world of semantic search and natural language processing technology, Predictive Coding will also go mainstream in 2012.  New Information governance and eDiscovery technology vendors will emerge that have seamless integrated this technology into their platforms.  Litigators will begin to understand the value of Predictive Coding, courts will begin to accept the results and users will begin to demand its use.  Offshore coding will become less attractive as Predictive Coding will enable all but the very detailed review and tagging to be done automatically.

Informationn Governance and eDiscovery for Social Media Will be Required
Pushed by the ethical requirements for litigators to understand and utilize eDiscovery for social media and the practical requirements to ensure that all pertinent ESI is being collected and submitted, there will be a  major move by the courts and litigators in 2012 to ensure that social media evidence is being collected and submitted with an appropriate chain of custody and with access to metadata to ensure the validity of the evidence.  And, as a results, legacy ECA vendors will social media file types to their bag of tricks and numerous new Discovery tools for social media will be released in 2012.

End-to-End Information Governance and eDiscovery Solutions
As Early Case Assessemnt (ECA) vendors expand their product lines "right" into document review and case management and as document review platform expand their product lines "left" into ECA, the market is going to have a choice of more end-to-end information governance and eDiscovery solutions.  In addition, we will see the integration of data mapping, legal hold, semantic search, predictive coding, project management, workflow management and case management into these end-to-end solutions.

Litigator Will Become More Technology Savy
Out of both practical necessity and statute ordered requirements, litigators will become more technology savvy in 2012.  The days of the hands-off, don't bother me with the technical details for eDiscovery litigator are quickly coming to a close. 

Information Governance and eDiscovery Pricing will Drop
The move to the cloud along with easily scalable virtual solutions offered up as Software-as-a-Service (SaaS) will enable a dramatic price decrease for information governance and eDiscovery in 2012.

eDiscovery will become a subset of Information Governance
As I have predicted in previous years, as eDiscovery moves to the enterprise, eDiscovery will become a subset of Information Governance in 2012.


In conclusion, 2012 is going to be a very exciting year in information governance and eDiscovery.  Enjoy the rest of 2011 and strap yourself in for a wild ride in 2012.



 




Labels: , , , , , , , , , , ,