Magazine article Information Management

Technology Tips for Cutting E-Discovery Costs

Magazine article Information Management

Technology Tips for Cutting E-Discovery Costs

Article excerpt


There is one sound always associated with announcing the estimated costs of electronic discovery. It is a gasp. Sometimes accompanied by a wheeze of pain, sometimes by a grunt of reluctant acceptance, and sometimes by a curse of protest. No matter how it's sliced and diced, e-discovery is not cheap.

Still ... inquiring minds have wondered whether it really needs to be quite as expensive as it is. Technology is a marvel--can't it be employed as a friend and ally in cutting discovery costs?

A Typical Scenario

An organization receives a letter from a competitor threatening a lawsuit, claiming that a recent hire has stolen proprietary information and taken it to that organization. Perhaps the organization has not actually received a letter, but it has reason to believe that there will be litigation involving it. Either way, it is now in a litigation hold and must quickly preserve any evidence pertaining to the alleged wrongdoing.

Larger organizations may have records management systems in place to deal with the rapid identification and preservation of information. But many don't have a huge budget to implement data preservations systems just for the purpose of preserving evidence for a case.

The more common scenario is for an organization to have a rudimentary system of information categorization and retention that doesn't lend itself very well to reacting to the litigation at hand. Its initial reaction is to save everything just in case it may be relevant. After all, storage space is cheap and getting cheaper. However, this initial premise will significantly raise costs for the litigation. The single, most costly component of e-discovery is the attorney review. Therefore, the goal must be to keep the data volume to a minimum.

Locating the Data

Hopefully, the organization has some sort of records management system that can aid in identifying what data should be preserved. If not, it needs to develop a data map that identifies the potential location of electronic information. It should not forget data that may be held with third parties. As an example, if it outsources its payroll and the lawsuit involves employee compensation, it needs to notify the payroll company not to destroy any information and to preserve data pertaining to compensation.

What if the organization doesn't know where the information is and it hasn't restricted where employees can place data? At a minimum, the organization's computer usage policy should identify the acceptable uses of computers and what equipment is acceptable. For example, USB flash drives are a dangerous source of data theft if not properly controlled. All too often, disgruntled employees will copy corporate data to a USB flash drive as they depart their employment. Organizations could lock down the USB ports on computers, but that may hinder real business usage such as digital cameras or USB printers. It could instead install USB monitoring software that can centrally log all USB activity on every computer.

What if the organization still doesn't know where there data is and it has never mapped out all the potential locations? There still may be hope. With the increased interest in electronic data discovery, there are now technical solutions to aid in finding the data. It could purchase a hardware device that connects to the computer network. These devices work in a fashion similar to a web crawler, "crawling" the network to identify such things as files, owners, and contents.

The organization must make sure that the device will work in its environment. As an example, the device may require that file and print sharing be enabled on all computers or that the crawling agent be given administrator privileges. Some manufacturers price their devices based upon the amount of data "discovered;' and others price the device based upon the amount of volume it can store. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed


An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.