Asia (Other)

Screen Shot 2019-05-22 at 7.03.43 PMIn-house counsel are often called on to manage an internal investigation. How can you effectively plan for and manage these investigations? We explore how electronic discovery (eDiscovery) tools help you mitigate risk and achieve your fact-finding mission.

 

Internal investigations may be required for a number of reasons, including a whistleblower complaint for suspicion of fraud or in response to regulator’s request. The objective of any investigation is to assist with fact-finding. You want to gather evidence and strategise your response plan based on the findings.

The Scenario – Fraud Investigation

Your company has received whistleblower allegations for fraud and corruption. You need to manage the internal investigation and form the investigation team. The local regulators have also heard of this wrongdoing and made a regulatory request for information. The board may decide to proceed with litigation if necessary.

Investigation Steps using eDiscovery

At the beginning of the internal investigation, acting quickly and ensuring that no potentially relevant data is destroyed is essential. Scoping your next steps begins with investigation planning.

Investigation Planning

It is important to identify the nature of the fraud and corruption allegation, and plan the investigation accordingly. The investigation will uncover any evidence of the fraud/corruption and helps the board decide on the appropriate action. Whether the investigation is in-house or you are using a third party, such as a law firm or external provider, you need a comprehensive investigation plan. At the initial planning stages, you want to define the issues to be resolved to give all parties clarity.

For the information gathering stage, the sources of data and collection methodologies should be mapped. Identifying key persons and custodians involved in the allegation will help you focus on the right data sources. Important evidence could be found in emails and documents collected from laptops, phones and company servers related to these key persons.

Preliminary steps to take include:

  • Removing access to company servers and devices for the suspected wrongdoers
  • Suspension of employment
  • Alerting your IT Team to monitor for any deletion or copying of data

The question of who should undertake the investigation is also decided at this stage. If a third party provider, ensure there are no conflicts and they are objective and independent. Also, establish clear reporting and escalation lines during your planning.

Evidence Collection

Your next step is to collect the evidence. If the data is located in multiple locations and jurisdictions, you may have to take into account different laws of data privacy, state secret laws and privilege laws.

There is a high risk that relevant data will be deleted or changed by the wrongdoer. It may be appropriate to undertake a full forensic collection instead of a basic collection. Forensic collection meets requirements for evidence in relation to chain-of-custody and authentication. Whichever method you choose, it is important that defensible preservation and collection methods are used so evidence is acceptable in court proceedings should litigation arise.

Confidentially is a major issue when considering collection methodology, particularly when deciding who will review the evidence. Finally, collection parameters and timelines must be carefully set so nothing is missed but time and resources are not wasted.

Using eDiscovery for Review

Your investigation may involve reviewing thousands or tens of thousands of emails and data. Today, there are tools available to cut down on time and costs.

Let us assume that your investigation involves 88GB of email data. Reviewing this using the traditional approach of printing (1.2million pages) and reviewing in hard copy would be challenging. You may struggle to conduct the investigation in time for the board to make decisions and to meet the regulator’s request deadline.

The eDiscovery method uses an online review platform powered with analytics tools. One of the advantages is the ability to conduct an Early Case Assessment (ECA). ECA helps you quickly identify key documents within large datasets so you can focus on critical evidence first and prioritise these for review. ECA provides you with a high-level overview of the data and helps you remove duplicated or irrelevant information.

Investigation Reporting

The investigation report will help you report to all stakeholders in sufficient detail. You can then maintain privilege and make recommendations to the board. In the process, you can examine the root cause of the wrongdoing and consider any lessons learned.

Conclusion

With eDiscovery tools, your internal investigations can be more efficiently and accurately conducted, especially if it involves large data sizes. As companies move into the world of Big Data it is increasingly important to be aware of the investigation options available to select the most appropriate.
E: sales@lawinorder.com
W: www.lawinorder.com.sg

_________________________

Screen Shot 2019-04-12 at 3.34.17 PM

3 Phillip Street, #17-01, Royal Group Building, Singapore 048693
T: (65) 6714 6655
F: (65) 6714 6677
E: singapore@lawinorder.com
W: www.lawinorder.com.sg

Related Articles by Firm
Data collection and early case assessment for investigations
Data collection and analysis for investigations is very different to collection for discovery or review. This article discusses the differences; how Early Case Assessment (ECA) can assist and the benefits of using review technology ...
Spotlight on eDiscovery
Many people are still confused about what electronic discovery encompasses ...
Will we see the end of Keywords in eDiscovery?
With the advances in Technology Assisted Review (TAR), it raises questions as to whether keywords still have a place in eDiscovery ...
How to Make Data Collection More ‘Effective’
Data can be collected efficiently, but if relevant data is not collected then the case will not come together.
Information Governance: Preserving Data and Being Prepared for Investigation
Organisations need to ensure their rules around information governance are being enforced. Many US organisations have an information governance officer in their IT, legal ...
How to speak IT
Ideally, everyone should have a basic understanding of the company’s IT infrastructure, not least because as more companies digitise, the risk of cyber threats increases. A cyberattack can come from anywhere ...
Computer Forensics and the Rise of the Drone
With more people being confined to their homes in different parts of the globe, hobbyists will be finding new uses for their drones ...
Redactions? How to Ensure There are no Nasty Surprises
With recent headlines highlighting the damage and embarrassment that can be caused by poorly redacted documents, it is no wonder many firms and corporates are turning to legal document management specialists to secure their redactions ...
Self-Collection Risks
When digital evidence is required at the start of a matter, it’s easy to get swept up in the moment and start rushing to gather the evidence but this is a key time to step back, take a moment ...
What Happens After the Dawn Raid?
The dawn raid has led to the forensic collection of 100,000 documents, now safely secured on a hard drive. What is the process from here? It’s important to plan your strategy in advance to minimise downtime, extract relevant documents and ...
Bringing eDiscovery In-House? Four Tips to Get You Started
With an increase in litigation and in costs for document review, more and more companies are considering bringing parts, if not all, of the eDiscovery process in house ...
A Lawyer’s Future is Looking Sharp with Electronic Hearings
The benefits of running an efficient collection and forensic process extends all the way to the hearings room ...
Forensic investigations, the role of corporate counsel and the rise of information governance
Head of Forensics – Erick Gunawan, discusses the Role of Corporate Counsel in the context of litigation or investigation and the increasing importance of information governance ...
Forensic investigations and cross-border matters
What are the current trends in forensic investigations for cross-border matters? Head of Forensics - Erick Gunawan, looks at the constant evolution in data types and volumes, and the ever-tightening data privacy laws and regulatory intervention ...
The evidence collector that’s always with you
It is an integral part of our life these days and an item that is rarely further than arm’s reach ...
Related Articles
Data collection and early case assessment for investigations
Data collection and analysis for investigations is very different to collection for discovery or review. This article discusses the differences; how Early Case Assessment (ECA) can assist and the benefits of using review technology ...
Breakthroughs in Vietnam’s securities market
Since the first promulgation of the law on securities in 2006, Vietnam’s securities market has experienced dramatical growth (roughly twentyfold in market capitalisation) ...
The rooster is on the run
The pursuit of happiness has been an inalienable right, at least in the United States, since July 4, 1776 when it originated as an “unalienable” right in the Declaration of Independence ...
Related Articles by Jurisdiction
MALAYSIA: Managing risks along China’s belt and road initiative
China’s belt and road initiative (BRI) involves Chinese companies investing in or with companies in the belt-and-road countries ...
Innovating internal investigations in today’s hyperconnected world
Data visualisation tools have emerged as a powerful resource for internal investigations ...
Global buyers continue to look to Asia
Strong growth and a rising middle class continue to attract foreign investors to the region, though outbound activity has fallen ...
Latest Articles
Data Privacy in Malaysia
DFDL’s William Greenlee sets out the data protection regulatory framework in Malaysia and its recent developments ...
Cross-border transfer of personal financial information in China
Jingtian & Gongcheng partners Yuan Lizhi, Hu Ke and associate Wang Beining take us through the details of the regulatory framework ...
Amendments to three data privacy laws in Korea and the implications
By Kwang-Wook Lee, Helen H. Hwang, Chulgun Lim and Keun Woo Lee of Yoon & Yang ...