Posted on: February 15, 2018in Blog
Types of eDiscovery Data to Consider for Your Retention Policy
Data is duplicated. It’s at the core of how networks work. In the simplest of examples, you send an email, a copy is stored in your sent items and another copy is stored in the recipient’s inbox. If you’re both working at the same company, it doesn’t take long for this to compound continuously and bloat your servers with unnecessary copies of the same file over and over again. From an IT perspective, this data is one big massive store that needs to be “managed.” Whether it’s backup for disaster recovery, archiving, subject to a legal hold, etc.
Regardless of your organization’s size, having some litigation capability in-house can make financial and operational sense – and that includes defining a litigation response plan. Here's a guide for beginner's to get you started on creating your own response plan today.
Many corporate clients that find themselves as serial litigants will rely on outside counsel to manage their discovery data. These firms, in turn, rely on technology and professional service providers that specialize in managing electronically-stored information in a number of different capacities. Larger firms have an army of outside vendors they call upon for connected but discreet tasks. Think forensic acquisition, data culling, document hosting and attorney review.
In the last decade it has become a widely accepted practice to have this data sit outside the firm firewall due to volume and turn-around constraints. In order for you to keep track of your own company’s information you should understand the eDiscovery process and how data is created.
Data retention and eDiscovery
Due to the competitive nature of the industry, many eDiscovery providers typically offer a clear and concise picture up front to let you know how your data is going to be handled–and will often provide full transparency into any subcontractors they have vetted. However, it's important to understand your data and how it's created throughout the process so you can plan your protocols and retention policies accordingly.
Types of Data Created During the eDiscovery Process
If or when you are ever in doubt, refer to the list of data types below to understand what is created during the eDiscovery process.
- Project tracking data
All project-related material that corresponds with specific matters and/or work orders. This includes email correspondence, contracts, Chain of Custody forms, etc. and any data that is tied to any project request handled by a subcontractor employee. Primarily, identified as external communication or exchange of specific detail regarding potential, ongoing or completed work.
- Source data
Raw data originating from an outside entity and submitted to subcontractor for the purpose of processing via media, FTP/SFTP and/or email correspondence. This includes data forensically extracted and/or original data that is provided by a client and accompanied with executed Chain of Custody (COC) documentation.
- Case or production data
Any data or database derived or as a result of any internal application or network processes. Specifically, any exports, replicated, hosted or outputted data that stems from any service application used or managed by subcontractor.
- Work product (work space) data
Any data derived or as a result of any internal application or network processes, but used primarily for the purpose of prepping, experimentation, cataloging, preliminary/in-depth analysis and/or investigation.
- Deliverable data
The copy of data provided to an outside party in the form of digital media or upload.
- Workplace data
Data identified as internal and external documents related to general business operations. External documents are typified by invoices, payment invoices, tax returns, etc. and are in some format presented to outside entities as needed. Internal documents such as pricing, payment forecasts, sales statistics, employee files, bank statements, etc. are used inside the company’s daily functions.
Other Vital Data Retention Sources
Other data not classified as any of the categories above are usually created by an analyst/user/employee as a bi-product for given task. The purpose of classifying the data types is not only to delineate and organize an internal network, but also to apply different retention policies to each.
- Online Storage
Subcontractor will retain matter-specific data online (source, case/production, deliverable), housed on a fast storage network server for requested period, and will guarantee immediate access at any given time. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.
- Near-line Storage
Subcontractor will retain matter-specific data online (source, case/production, deliverable), on a slower storage network server for requested period, and will guarantee immediate access at any given time. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.
Subcontractor will back up the matter-specific data (source, case/production, deliverable) on an off-line storage medium such as Tape or External HDD. Restoration within a timeframe of 24-72 hours would be required in order to access the archived data. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.
Subcontractor will completely remove the matter-specific data (source, case/production, deliverable) from network server upon prior notification. Certificate of destruction is available upon request.
- Take the blinders off. Make sure you know where your data is housed and have a full grasp of your exposure.
- Be proactive. Don’t wait for your first eDiscovery nightmare to implement a retention plan. Start by asking your outside providers to supply a copy of their retention plan, and use that to help you create a template of your own.
- Revisit often. The rules governing what information needs to be stored and/or preserved and what information is reasonably within your control not only vary by industry, but are constantly evolving in today’s fast-paced age of information.
- Ask an expert. They’re out there; they’ve been there before. Don’t be afraid to ask for directions.
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted November 08, 2018
How to Document Your Chain of Custody and Why It's Important
Posted October 31, 2018
7 Tips for Better Law Firm Security
Posted October 19, 2018
Creating Strategic eDiscovery Workflows for Small Teams
Posted October 10, 2018
How to Reduce Your Threat of Cyber Attacks in Wake of China Hack Allegations
Posted September 26, 2018
X1 Insight and Collection & RelativityOne Integration: Testing and Proof of Concept
Posted September 19, 2018
D4 used Relativity to pinpoint a single Chinese character with hundreds of thousands of WeChat messages
Posted September 12, 2018
Why You Should Implement Pre-Review Analysis in Your ECA Workflow
Posted September 05, 2018
What is Data Mapping? ESI Basics for eDiscovery
Posted August 29, 2018
ILTACON 2018 Takeaways: 4 Ways to Get Your Lawyers to Use Advanced Technologies
Posted August 22, 2018
Basic eDiscovery Early Case Assessment Checklist