Develop a Discovery Response Process Procedure: an organization-specific, customized step-by-step guide to executing Discovery Response Process. The procedure addresses all phases of the Discovery lifecycle. Also includes the review of draft procedures with in-house and outside Counsel as appropriate, and incorporation of needed changes, if needed.
Develop customized templates intended to complement the Discovery Response Process Workbook. These templates provide for the defensible and consistent preservation and collection of relevant data related to matters associated with litigation and/or regulatory inquiry.
Contoural will create a Discovery Conference Preparation Guide document designed to provide outside counsel with client’s expectations of how eDiscovery should be conducted in any legal matter, in addition to other litigation readiness attributes.
Develop protocols for eDiscovery phases which are reference guidelines for the variety of methodologies including using existing technology or identifying any new requirements applicable to common discovery activities. Provides alternate options if a deviation from standard operating procedures is indicated or warranted. Describes scenarios for when alternate approaches may apply.
Conduct Knowledge Transfer and Training, including the preparation of training materials and an onsite (or virtual) visit to review deliverables to educate client’s Legal and IT staffs on the various elements and uses of the Discovery Response Process, and incorporation of any necessary changes at the instruction of counsel. Includes training for Legal and IT functions on how to use the Discovery Response Process Workbook and associated templates.
Once an effective legal hold is in place, the subsequent stages of eDiscovery – including collection, processing, review, and production – also present risks and obligations for corporate counsel, as well as significant opportunities for reducing enterprise risks and discovery costs, through both good information governance practices and the strategic use of culling technologies. As part of its overall Information Governance roadmap, a company should consider developing a Discovery Response Plan (Discovery Response Process) that guides corporate counsel (and other stakeholders) in the consistent and repeatable planning and execution of each stage in the process. Additional steps, as outlined below, include selection and preparation of witnesses who may need to testify during depositions or discovery conference proceedings and the application of appropriate technology tools to support cost-effective review and production of ESI during the discovery process.
It is worth noting that other components of an Information Governance program can multiply the savings achieved by more efficient discovery response processes. As the amount of redundant, obsolete and trivial data it retains is reduced (decreasing its total data footprint), the company can, thereby, reduce the amount of data that must be preserved and processed in response to litigation needs over a period of years. The potential eDiscovery cost savings can provide powerful motivation for a litigation readiness initiative, especially in litigation-intensive environments.
When a litigation matter involves a specific past event or transaction, a well-framed discovery request will explicitly state the timeframe, in terms of the earliest and latest document dates that are covered by the request. Counsel can then frame the legal hold notice in terms of the requested timeframe. Depending on the situation, the required legal hold and discovery timeframes can go back several years.
In other cases, the discovery requests – and legal hold notices – may cover all documents and messages that contain relevant content, or that involve certain individuals or departments, without a specified time frame. In the absence of an effective Information Governance program, the scope of legal hold and discovery in such cases could include obsolete data that has been retained for many years or even decades in historical systems and storage media.
Multiple and cascading holds can become particularly burdensome if the relevant documents and data have been stored on the same media or otherwise commingled. In such cases, the organization may need to retain all of the documents for a very long time, i.e. until all the holds have been released for all the affected documents.
In-house Counsel need to develop and maintain sufficient knowledge and expertise to manage an outside vendor. Counsel must not allow the vendor to drive the discovery strategy, as well as its execution, without some level of oversight and control. While most vendors will be reasonable, there is, of course, a motivation to collect as much information as possible, and to store that information as long as they can manage to charge for doing so. To properly control discovery costs, Corporate Counsel must 1) work to limit the scope of data collected by the vendor and 2) understand the processes and the implications of storing the proposed volumes of collected data. Outside vendor activities should be part of any Discovery Response Process. Once that plan is in place, counsel must monitor and audit outside vendor activities on an ongoing basis.
As part of an Information Governance roadmap, a company should consider developing a Discovery Response Plan that guides Corporate Counsel and other stakeholders in the planning and execution of each stage of the discovery response process. The Discovery Response Process should be customized to address an organization’s litigation profile, and reflect industry best practices, as well as the company’s needs and resources (in the context of typical litigation and regulatory examination scenarios). The Discovery Response Process should include workflow diagrams to demonstrate discovery phases and a summary workflow to show how all phases fit together.
Contoural is the largest independent provider of strategic Information Governance, Privacy, and AI Governance consulting services, including records and information management, litigation readiness and control of privacy and sensitive information.
Copyright 2025. All Rights Reserved