Asia (Other)

Screen Shot 2019-05-22 at 7.03.43 PMIn-house counsel are often called on to manage an internal investigation. How can you effectively plan for and manage these investigations? We explore how electronic discovery (eDiscovery) tools help you mitigate risk and achieve your fact-finding mission.


Internal investigations may be required for a number of reasons, including a whistleblower complaint for suspicion of fraud or in response to regulator’s request. The objective of any investigation is to assist with fact-finding. You want to gather evidence and strategise your response plan based on the findings.

The Scenario – Fraud Investigation

Your company has received whistleblower allegations for fraud and corruption. You need to manage the internal investigation and form the investigation team. The local regulators have also heard of this wrongdoing and made a regulatory request for information. The board may decide to proceed with litigation if necessary.

Investigation Steps using eDiscovery

At the beginning of the internal investigation, acting quickly and ensuring that no potentially relevant data is destroyed is essential. Scoping your next steps begins with investigation planning.

Investigation Planning

It is important to identify the nature of the fraud and corruption allegation, and plan the investigation accordingly. The investigation will uncover any evidence of the fraud/corruption and helps the board decide on the appropriate action. Whether the investigation is in-house or you are using a third party, such as a law firm or external provider, you need a comprehensive investigation plan. At the initial planning stages, you want to define the issues to be resolved to give all parties clarity.

For the information gathering stage, the sources of data and collection methodologies should be mapped. Identifying key persons and custodians involved in the allegation will help you focus on the right data sources. Important evidence could be found in emails and documents collected from laptops, phones and company servers related to these key persons.

Preliminary steps to take include:

  • Removing access to company servers and devices for the suspected wrongdoers
  • Suspension of employment
  • Alerting your IT Team to monitor for any deletion or copying of data

The question of who should undertake the investigation is also decided at this stage. If a third party provider, ensure there are no conflicts and they are objective and independent. Also, establish clear reporting and escalation lines during your planning.

Evidence Collection

Your next step is to collect the evidence. If the data is located in multiple locations and jurisdictions, you may have to take into account different laws of data privacy, state secret laws and privilege laws.

There is a high risk that relevant data will be deleted or changed by the wrongdoer. It may be appropriate to undertake a full forensic collection instead of a basic collection. Forensic collection meets requirements for evidence in relation to chain-of-custody and authentication. Whichever method you choose, it is important that defensible preservation and collection methods are used so evidence is acceptable in court proceedings should litigation arise.

Confidentially is a major issue when considering collection methodology, particularly when deciding who will review the evidence. Finally, collection parameters and timelines must be carefully set so nothing is missed but time and resources are not wasted.

Using eDiscovery for Review

Your investigation may involve reviewing thousands or tens of thousands of emails and data. Today, there are tools available to cut down on time and costs.

Let us assume that your investigation involves 88GB of email data. Reviewing this using the traditional approach of printing (1.2million pages) and reviewing in hard copy would be challenging. You may struggle to conduct the investigation in time for the board to make decisions and to meet the regulator’s request deadline.

The eDiscovery method uses an online review platform powered with analytics tools. One of the advantages is the ability to conduct an Early Case Assessment (ECA). ECA helps you quickly identify key documents within large datasets so you can focus on critical evidence first and prioritise these for review. ECA provides you with a high-level overview of the data and helps you remove duplicated or irrelevant information.

Investigation Reporting

The investigation report will help you report to all stakeholders in sufficient detail. You can then maintain privilege and make recommendations to the board. In the process, you can examine the root cause of the wrongdoing and consider any lessons learned.


With eDiscovery tools, your internal investigations can be more efficiently and accurately conducted, especially if it involves large data sizes. As companies move into the world of Big Data it is increasingly important to be aware of the investigation options available to select the most appropriate.


Screen Shot 2019-04-12 at 3.34.17 PM

3 Phillip Street, #17-01, Royal Group Building, Singapore 048693
T: (65) 6714 6655
F: (65) 6714 6677

Related Articles by Firm
Forensic investigations and cross-border matters
What are the current trends in forensic investigations for cross-border matters? Head of Forensics - Erick Gunawan, looks at the constant evolution in data types and volumes, and the ever-tightening data privacy laws and regulatory intervention ...
The evidence collector that’s always with you
It is an integral part of our life these days and an item that is rarely further than arm’s reach ...
Related Articles
Amendment of the Law on Intellectual Property in compliance with the CPTPP
The changes follow ratification of the Comprehensive and Progressive Agreement for Trans-Pacific Partnership.
New economic substance regulations in the UAE
The rules are a response to the UAE being put on the EU's blacklist of non-cooperative tax jurisdictions.
Keeping up with the trend: The New DIFC Insolvency Law
The New Law introduces many welcomed features and is a step forward in maintaining the UAE’s position as a world leading trade hub.
Related Articles by Jurisdiction
The growth of third-party funders
Growing awareness of litigation funding is making it easier for businesses to pursue disputes ...
Legal innovation in BigLaw
For many people in the legal sphere, the word ‘innovation’ has become synonymous with ‘disruption’ — for others, the overuse of the word has relegated it to just another corporate buzzword ...
Latest Articles
Amendment of the Law on Intellectual Property in compliance with the CPTPP
The changes follow ratification of the Comprehensive and Progressive Agreement for Trans-Pacific Partnership.
New economic substance regulations in the UAE
The rules are a response to the UAE being put on the EU's blacklist of non-cooperative tax jurisdictions.
Creating value in law. Is it time to Stop, Collaborate and Listen?
To ensure that we’re creating excellence, we need to think, without distraction, of the bigger picture.