Taming the Big Data Dragon

Driving Down the Cost of Ediscovery Part 1

Driving Down the Cost of Ediscovery Part 1

Taming the Big Data Dragon

The more data you have, the higher your ediscovery costs. Therefore, the first step to driving down the cost of ediscovery is simply reducing the amount of data you have to manage. Data reduction requires consideration of the entire lifecycle of data, beginning with a plan for information governance and ending with defensible data disposition.

Information Governance: Organizing Your Organization

Information governance (or “info gov”) is the overarching approach that dictates how your company controls and organizes the mountains of data it generates from sources like employees, customers, prospects, and departments. Companies need to be able to process, store, and retrieve data for a number of reasons, including regulatory requirements and litigation as well as product innovation and sales strategies.

Ediscovery professionals can play a key role in establishing the information governance initiatives that set the rules for how data is acquired or created, processed, managed, stored, retrieved, and deleted. You already have insight into the data types and repositories that have historically constituted higher volumes or greater risks for ediscovery (such as the time required to preserve, collect, and review that data). You can further refine your information governance recommendations by monitoring basic metrics in your work, such as tracking where time and money is being spent on ediscovery by data type or source.

The cost of ediscovery is skyrocketing as data volumes and complexity continue to expand. At the same time, corporate legal teams are frequently asked to do more with less while taking on additional responsibilities.

More Devices = More Data

Legal teams are a great resource for identifying the devices, applications, and data repositories that employees are using — even when they’re not on the “approved” list. When you interview custodians, verify your data creation and retention practices with a few key questions:

  • Are you using any personal devices or applications for business purposes?
  • Have you stored or accessed any data anywhere outside of the company-approved list of repositories (for example, in unauthorized collaboration tools or cloud storage repositories)?
  • If so, does any of that externally retained data include any personally identifiable information (PII) or payment card industry (PCI) data?

Clarifying the type of data being retained, such as PII or PCI data, can aid in reducing cybersecurity and privacy risks to the company. During ediscovery, legal teams interact with both custodians and their data, identifying the types of data captured and retained on various devices. These custodian interviews are essentially a hands-on way to understand employees’ real-world data governance practices. All of these routine ediscovery actions give you unique insight into the potential vulnerabilities and risks posed by your data, which can inform your privacy and security initiatives.

Elevate Your Ediscovery:

Consider circulating portions of your custodian questionnaires to employees periodically, independent of any legal hold; they represent a quick way to determine whether any unauthorized devices, applications, or data repositories have made their way into your organization.

Defensible Deletion

To adequately manage your data, you must have a plan for defensible deletion, including adherence to record retention schedules coupled with clearly understood preservation obligations. Companies are required to keep data for a variety of legitimate reasons, such as regulatory compliance, records management, and legal obligations. However, when data has outlived its legitimate business purpose, organizations should get rid of that aged, redundant, or obsolete data. The question is, how can data be deleted in a manner that will stand up to later scrutiny should a claim of spoliation be leveled against the company?

Legal teams can help assess the risk of data retention and deletion policies for legacy applications and storage devices (including old backup tapes). They can also provide guidance on reasonable practices to inform the decisions about whether to keep or discard data that is otherwise deemed redundant or obsolete. And, of course, they can pave the way for defensible deletion by routinely releasing expired legal holds after a duty to preserve no longer applies.

New Technology Selection

Finally, legal teams should be engaged in evaluating new applications or data repositories that are being considered for use within an organization. Any formal evaluation should include a thorough assessment of how the data that will be created can be governed, encompassing how long it should be kept, how it can be preserved when necessary, and what protocols are used to collect the data when required for ediscovery.

Elevate Your Ediscovery:

Use Legal Hold Pro’s tracking feature to capture metrics on the costs of ediscovery and data preservation. These metrics can identify areas within the company where information governance initiatives would have the greatest impact on reducing data volumes and mitigating risk

Share This