希望访问中文页面? 请点此(简体中文版)  

Posted on: February 15, 2018

in Blog

Types of eDiscovery Data to Consider for Your Retention Policy

Data is duplicated. It’s at the core of how networks work. In the simplest of examples, you send an email, a copy is stored in your sent items and another copy is stored in the recipient’s inbox. If you’re both working at the same company, it doesn’t take long for this to compound continuously and bloat your servers with unnecessary copies of the same file over and over again. From an IT perspective, this data is one big massive store that needs to be “managed.” Whether it’s backup for disaster recovery, archiving, subject to a legal hold, etc.

Regardless of your organization’s size, having some litigation capability in-house can make financial and operational sense – and that includes defining a litigation response plan. Here's a guide for beginner's to get you started on creating your own response plan today.

Many corporate clients that find themselves as serial litigants will rely on outside counsel to manage their discovery data. These firms, in turn, rely on technology and professional service providers that specialize in managing electronically-stored information in a number of different capacities. Larger firms have an army of outside vendors they call upon for connected but discreet tasks. Think forensic acquisition, data culling, document hosting and attorney review.

In the last decade it has become a widely accepted practice to have this data sit outside the firm firewall due to volume and turn-around constraints. In order for you to keep track of your own company’s information you should understand the eDiscovery process and how data is created.

Data retention and eDiscovery 

Due to the competitive nature of the industry, many eDiscovery providers typically offer a clear and concise picture up front to let you know how your data is going to be handled–and will often provide full transparency into any subcontractors they have vetted. However, it's important to understand your data and how it's created throughout the process so you can plan your protocols and retention policies accordingly.

Types of Data Created During the eDiscovery Process

If or when you are ever in doubt, refer to the list of data types below to understand what is created during the eDiscovery process.

Project tracking data

All project-related material that corresponds with specific matters and/or work orders. This includes email correspondence, contracts, Chain of Custody forms, etc. and any data that is tied to any project request handled by a subcontractor employee. Primarily, identified as external communication or exchange of specific detail regarding potential, ongoing or completed work.

Source data

Raw data originating from an outside entity and submitted to subcontractor for the purpose of processing via media, FTP/SFTP and/or email correspondence. This includes data forensically extracted and/or original data that is provided by a client and accompanied with executed Chain of Custody (COC) documentation.

Case or production data

Any data or database derived or as a result of any internal application or network processes. Specifically, any exports, replicated, hosted or outputted data that stems from any service application used or managed by subcontractor.

Work product (work space) data

Any data derived or as a result of any internal application or network processes, but used primarily for the purpose of prepping, experimentation, cataloging, preliminary/in-depth analysis and/or investigation.

Deliverable data

The copy of data provided to an outside party in the form of digital media or upload.

Workplace data

Data identified as internal and external documents related to general business operations. External documents are typified by invoices, payment invoices, tax returns, etc. and are in some format presented to outside entities as needed. Internal documents such as pricing, payment forecasts, sales statistics, employee files, bank statements, etc. are used inside the company’s daily functions.

Other Vital Data Retention Sources

Other data not classified as any of the categories above are usually created by an analyst/user/employee as a bi-product for given task. The purpose of classifying the data types is not only to delineate and organize an internal network, but also to apply different retention policies to each. 

Online Storage

Subcontractor will retain matter-specific data online (source, case/production, deliverable), housed on a fast storage network server for requested period, and will guarantee immediate access at any given time. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.

Near-line Storage

Subcontractor will retain matter-specific data online (source, case/production, deliverable), on a slower storage network server for requested period, and will guarantee immediate access at any given time. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.

Archive

Subcontractor will back up the matter-specific data (source, case/production, deliverable) on an off-line storage medium such as Tape or External HDD. Restoration within a timeframe of 24-72 hours would be required in order to access the archived data. There is an associated cost with this option that will be submitted for client approval prior to charges being incurred.

Delete

Subcontractor will completely remove the matter-specific data (source, case/production, deliverable) from network server upon prior notification. Certificate of destruction is available upon request.

Key Takeaways

  • Take the blinders off. Make sure you know where your data is housed and have a full grasp of your exposure.
  • Be proactive. Don’t wait for your first eDiscovery nightmare to implement a retention plan. Start by asking your outside providers to supply a copy of their retention plan, and use that to help you create a template of your own.
  • Revisit often. The rules governing what information needs to be stored and/or preserved and what information is reasonably within your control not only vary by industry, but are constantly evolving in today’s fast-paced age of information.
  • Ask an expert. They’re out there; they’ve been there before. Don’t be afraid to ask for directions. 

Discover More:

Discover More Categories

D4 Weekly eDiscovery Outlook

Power your eDiscovery intellect with our weekly newsletter.