Ediscovery Planning: Your Definitive ESI Protocol Checklist

Nextpoint, Inc.
Contact

A detailed ESI protocol will simplify ediscovery and lead to smoother case planning in every step of the litigation process.

Establishing an ESI protocol might seem daunting at first, but answering a few simple questions at the outset of your case will help you stay on top of complicated ediscovery matters. This checklist lays out the questions that will help you create a strong ESI protocol.

What is an ESI protocol?

ESI stands for Electronically Stored Information, or the digital evidence that dominates most modern litigation. Your ESI protocol will lay out your plan for handling this digital evidence. It will cover how you will collect and filter data, deduplicate documents, produce evidence, manage privilege logs, and more. It will become the road map that will guide you through discovery.

With strong ESI protocols, you’ll show up to your Meet and Confer knowing exactly what you need from opposing counsel. These clear requests will prevent road bumps later on in discovery.

What are the benefits of a standardized ESI protocol?

Here are five key advantages that lawyers gain through developing a protocol:

1. You’ll think through discovery for the entire matter.

2. A well-drafted protocol will protect your client’s data and their interests.

3. You’ll identify sources of data that require additional consideration and planning for collection and production.

4. You can leverage the protocol for third-party data.

5. It’s your discovery blueprint for the case and you’ll go back to it time and time again.

Your ESI Protocol Checklist

Think through these questions to ensure that no potential issues are overlooked when developing your protocol.

1. Do you currently have an ESI protocol template in-house?

If you have protocols from past cases, you can use them to create a basic template and tailor it to meet the needs of your current case.

2. What type of case are you involved in currently?

The type of case you’re working on will influence the types of ESI that you’ll need to focus on in your protocol. For example, intellectual property and construction cases often include designs in the form of CAD files. These files are really only usable in their actual source software, so attorneys should think about how they will handle collecting and producing these proprietary file types.

3. What type of productions have you delivered/received in the past, outside of your current matter?

Think about what you can learn from previous productions. What metadata did you find most useful? Were there times that you needed files in their native format? Did you face any hiccups that could have been prevented?

4. What type of venue will the proceedings be held in?

Consider whether there are any discovery rules or guidelines specific to the venue of your case.

5. What type of firm(s) is your Opposing Counsel? (e.g. Mid/Large/Solo)

Different sized firms will have varied resources and approaches to ediscovery. If you work in a small firm, here are some tips on how to level the playing field in ediscovery.

6. Where will the majority of your data be collected from?

Think about potential relevant custodians and where their data lies. Will you have to physically collect data from a laptop or backup server? Are social media accounts going to play a role in the case? Is relevant information being discussed in text message form?

7. Is there any proprietary software at issue?

Proprietary or closed-source software is copyrighted by the developer, which can complicate its role in legal issues. You may want to include discussions around cost sharing for necessary licenses.

8. Will there be any hard-copy paper documents to collect?

Consider whether you can negotiate to have paper documents scanned prior to production to simplify review. Ensure proper measures are being taken at the time of scanning, so organization structures are not lost during an electronic conversion.

9. What type of metadata do you anticipate being most crucial during your review? (i.e. When v. Where v. Who)

Metadata, like timestamps and email authors, is key to streamlining document review. Even if the information is included in the text of the document, it’s still important to ensure that metadata is included in a load file for searching and filtering purposes.

10. Will any culling/filtering method be applicable in your case?

If you or your opposing counsel plan to use predetermined search terms, predictive coding, or other TAR (Technology Assisted Review) tools, you should specify how they will be applied. In any case, early data filtering is an important part of simplifying discovery and reducing costs, so consider which methods you will use and how much transparency you may want between parties.

11. How do you want privilege and/or your privilege log handled?

With the large data volumes common in most modern litigation, it’s become increasingly harder for lawyers to prevent inadvertent disclosures. Creating a no-fault standard in your ESI protocol can help deter discussions around “reasonable steps” if said disclosure occurs in the course of discovery exchange.

12. How do you want deduplication handled? (i.e. Universal v. Isolated Source)

Deduplication is one way you can reduce your initial data set. Here are some tips on deduplication.

13. What are your production delivery methods and goals?

Be sure to specify a secure delivery method for the productions. For example, if tight deadlines are at issue, electronic deliveries could provide an efficient solution.

CLICK HERE TO DOWNLOAD A PDF OF THE CHECKLIST

Written by:

Nextpoint, Inc.
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Nextpoint, Inc. on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide