Asia (Other)

Screenshot 2020-06-10 at 1.12.11 PMOrganisations need to ensure their rules around information governance are being enforced. Many US organisations have an information governance officer in their IT, legal or risk team ensuring the procedures are promoted. In Australia, we see more hybrid roles where IT and record managers take on parts of governance.

Increasingly, corporates in Australia are ensuring their data is compliant with local law and critical data is preserved.

Identifying the Data

Organisations need to know where their data is before attempting to capture it. In the event of a litigation or investigation, relevant data sources need to be identified.

For example, regarding an IP infringement and possibly loss of communication data, HR data won’t be relevant. Necessary data would probably include emails and Skype chat data. There would likely be one target custodian and therefore, it’s possible to narrow the investigation to that person. It wouldn’t be necessary to examine everyone’s emails and Skype messages.

Collecting the Data

It’s important to have a plan to collect data effectively from a workflow and time perspective, particularly taking into account the multiple platforms, eg social media, iOS, Android, etc.

Defensibility is essential so evidence is admissible in court. Consider a murder case. When evidence is collected, gloves are used so evidence isn’t contaminated. Similarly, data should be collected preserving its integrity.

Thought should be put into doing the collection internally or hiring a third-party forensics expert. Sometimes organisations miscalculate the friendship between the IT department and the custodian. This may jeopardise the investigation, so these factors must be taken into consideration.

Processing the Data

Once data is collected, it needs to be processed before it can be reviewed. Different data types can be difficult to review on the different platforms, eg emails on Outlook, chat on Skype, sales data on SalesForce, etc.

Processing extracts the text and metadata and puts everything into a single review platform where multiple reviewers can review the data and all work product is preserved.

The Role of Analysis

The next step is to add analysis to make the review more efficient and faster.

One tool is email threading which allows reviewers to only look at the last email in a chain, so only the most inclusive email is reviewed. This will probably contain all the content from previous emails in the chain.

Artificial Intelligence can learn the reviewing patterns of the reviewer so the most relevant material amongst the data is prioritised according to the way the reviewer is reviewing.

Deletion analysis lets a reviewer know when emails are missing. Computer forensics is then used to potentially recover lost emails and process them ready for review.

It’s possible to do high level analysis as well. This gives reviewers a sense of the type of data they are working with. For example, how are two suspects communicating? How often and what times are they communicating? Are there others that need to be looked at? This creates an overview of the conversation.

Email deletion analysis can also produce information. For example, if there is a drop in emails, it could be because of a holiday or an issue with the email system or perhaps people are deleting documents to cover tracks. When it’s time to do the document review, in-depth analysis can be done using duplicate analysis, keyword searching, conceptual searching, etc.

Once analysis is completed and the relevant data found, the pertinent documents for court have ultimately been produced.

Another highly significant benefit, having produced those documents for court, the organisation has been through an information governance learning process about how to preserve data and prepare itself for future investigation. This may change the way an organisation looks at their protocols and how they retain documents and data.

 

________________________

Law In Order is a leading provider to the legal profession of eDiscovery and legal support services including forensic data collection, information governance, managed document review, and virtual arbitration or mediation services. We provide a secure, flexible and responsive outsourced service of unparalleled quality to law firms, government agencies and inhouse corporate legal teams. The Law In Order team is comprised of lawyers, paralegals, system operators, consultants and project managers, with unparalleled knowledge and experience in legal technology support services.

________________________


By Erick Gunawan

E: erick.gunawan@lawinorder.com
W: www.lawinorder.com

__________________________

Screen Shot 2019-04-12 at 3.34.17 PME: sales@lawinorder.com
W: www.lawinorder.com

Related Articles by Firm
Spotlight on eDiscovery
Many people are still confused about what electronic discovery encompasses ...
Will we see the end of Keywords in eDiscovery?
With the advances in Technology Assisted Review (TAR), it raises questions as to whether keywords still have a place in eDiscovery ...
How to Make Data Collection More ‘Effective’
Data can be collected efficiently, but if relevant data is not collected then the case will not come together.
How to speak IT
Ideally, everyone should have a basic understanding of the company’s IT infrastructure, not least because as more companies digitise, the risk of cyber threats increases. A cyberattack can come from anywhere ...
Computer Forensics and the Rise of the Drone
With more people being confined to their homes in different parts of the globe, hobbyists will be finding new uses for their drones ...
Redactions? How to Ensure There are no Nasty Surprises
With recent headlines highlighting the damage and embarrassment that can be caused by poorly redacted documents, it is no wonder many firms and corporates are turning to legal document management specialists to secure their redactions ...
Self-Collection Risks
When digital evidence is required at the start of a matter, it’s easy to get swept up in the moment and start rushing to gather the evidence but this is a key time to step back, take a moment ...
What Happens After the Dawn Raid?
The dawn raid has led to the forensic collection of 100,000 documents, now safely secured on a hard drive. What is the process from here? It’s important to plan your strategy in advance to minimise downtime, extract relevant documents and ...
Bringing eDiscovery In-House? Four Tips to Get You Started
With an increase in litigation and in costs for document review, more and more companies are considering bringing parts, if not all, of the eDiscovery process in house ...
A Lawyer’s Future is Looking Sharp with Electronic Hearings
The benefits of running an efficient collection and forensic process extends all the way to the hearings room ...
Forensic investigations, the role of corporate counsel and the rise of information governance
Head of Forensics – Erick Gunawan, discusses the Role of Corporate Counsel in the context of litigation or investigation and the increasing importance of information governance ...
Forensic investigations and cross-border matters
What are the current trends in forensic investigations for cross-border matters? Head of Forensics - Erick Gunawan, looks at the constant evolution in data types and volumes, and the ever-tightening data privacy laws and regulatory intervention ...
Adopting eDiscovery for internal investigations
In-house counsel are often called on to manage an internal investigation. How can you effectively plan for and manage these investigations? We explore how electronic discovery (eDiscovery) tools help you mitigate risk and achieve your fact-finding mission.
The evidence collector that’s always with you
It is an integral part of our life these days and an item that is rarely further than arm’s reach ...
Related Articles
Are you ready for the global tax reform?
A brief discussion on how MNCs should respond to the OECD’s new measures relating to Automatic Exchange of Information and Transfer Pricing issues
Vietnam: Remarkable changes in the new Law on Enterprises
On June 17, 2020, the National Assembly officially passed a new Law on Enterprises to replace the current Law on Enterprises ...
Copyright and remote learning in the time of Covid-19
On August 15, 2020, Philippines’ President Rodrigo Duterte approved the recommendation of Department of Education Secretary Leonor Briones to defer the opening of classes from August 24, 2020 to October 5, 2020 in view of the Covid-19 pandemic ...
Related Articles by Jurisdiction
Third-party funding in Asia
Cheng-Yee Khong and Tom Glasgow of IMF Bentham examine the new regulatory environment for third-party funding in Singapore and Hong Kong. ...
Buyer, beware!
The final of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
Will we see the end of Keywords in eDiscovery?
With the advances in Technology Assisted Review (TAR), it raises questions as to whether keywords still have a place in eDiscovery ...
Latest Articles
Are you ready for the global tax reform?
A brief discussion on how MNCs should respond to the OECD’s new measures relating to Automatic Exchange of Information and Transfer Pricing issues
Sanctions and Investigations Q&A
Asian-mena Counsel sought wise counsel on the key issues in these risk-heavy areas from those with expertise at leading International law firm Baker McKenzie, and two thought-leading GC’s ...
Anti-corruption compliance in India
In recent years, there has been a paradigm shift in how corporate India addresses corruption, according to Manjula Chawla, Chandni Chawla and Ashna Gupta, of Phoenix Legal ...