Early case assessment

Last updated

Early case assessment refers to estimating risk (cost of time and money) to prosecute or defend a legal case. Global organizations deal with legal discovery and disclosure requests for electronically stored information "ESI" and paper documents on a regular basis.

Risk is the possibility of losing something of value. Values can be gained or lost when taking risk resulting from a given action or inaction, foreseen or unforeseen. Risk can also be defined as the intentional interaction with uncertainty. Uncertainty is a potential, unpredictable, and uncontrollable outcome; risk is a consequence of action taken in spite of uncertainty.

Lawyer legal professional who helps clients and represents them in a court of law

A lawyer or attorney is a person who practices law, as an advocate, attorney, attorney at law, barrister, barrister-at-law, bar-at-law, civil law notary, counsel, counselor, counsellor, counselor at law, solicitor, chartered legal executive, or public servant preparing, interpreting and applying law, but not as a paralegal or charter executive secretary. Working as a lawyer involves the practical application of abstract legal theories and knowledge to solve specific individualized problems, or to advance the interests of those who hire lawyers to perform legal services.

A legal case is a dispute between opposing parties resolved by a court, or by some equivalent legal process. A legal case may be either civil or criminal law. In each legal case there is an accuser and one or more defendants.

Over 90% of all cases settle prior to trial. Often an organization will spend significant time and money on a case only to find they want to settle for whatever reason. Legal discovery costs are usually the most burdensome financially to both plaintiff and defendant. Often, and during cases in the United States, an opposing party will strategize on how to make it as difficult as possible for you to comply with the discovery process, including time and cost to respond to discovery requests. Because of this, organizations have a continued need to conduct early case assessment to determine their risks and benefits of taking a case to trial without painful settlement discussions.

Trial coming together of parties to a dispute, to present information in a tribunal

In law, a trial is a coming together of parties to a dispute, to present information in a tribunal, a formal setting with the authority to adjudicate claims or disputes. One form of tribunal is a court. The tribunal, which may occur before a judge, jury, or other designated trier of fact, aims to achieve a resolution to their dispute.

A plaintiff is the party who initiates a lawsuit before a court. By doing so, the plaintiff seeks a legal remedy; if this search is successful, the court will issue judgment in favor of the plaintiff and make the appropriate court order. "Plaintiff" is the term used in civil cases in most English-speaking jurisdictions, the notable exception being England and Wales, where a plaintiff has, since the introduction of the Civil Procedure Rules in 1999, been known as a "claimant", but that term also has other meanings. In criminal cases, the prosecutor brings the case against the defendant, but the key complaining party is often called the "complainant".

Defendant accused person

A defendant is a person accused of committing a crime in criminal prosecution or a person against whom some type of civil relief is being sought in a civil case.

Many service organizations, law firms, and corporations refer to early case assessment differently. Consultants hired by the corporation or law firm on a case manage cases on a risk basis. There also exist a number of software tools that assist in and help facilitate the process of early case assessment. Effective early case assessment might require the combination of professional expertise and software. This pairing, depending on the professional and tools used can provide various degrees of early case assessment review. Early case assessment, as a managed process, often requires customization to each case and the client involved.

The early case assessment lifecycle will typically include all of the following:

  1. Perform a risk-benefit analysis.
  2. Place and manage a legal hold on potentially responsive documents (paper and ESI) in appropriate countries.
  3. Preserve information abroad.
  4. Gather relevant information for attorney and expert document review.
  5. Process potentially relevant information for purposes of filtering, search term, or data analytics.
  6. Information hosting for attorney and expert document review, commenting, redaction.
  7. Produce documents to parties in the case.
  8. Reuse information in future cases.

Early case assessment software is typically used by attorneys, corporate legal departments, risk managers, forensics teams, IT professionals and independent consultants to help them analyze unstructured electronically stored information.

The software approach to early case assessment typically includes the following:

  1. Determine the source files to analyze.
  2. Point the analysis tool to the files to be analyzed.
  3. Set parameters for the assessment.
  4. Allow the program to automatically scan and assess the data, which may be located on local hard drives, removable media, file servers, whole networks, etc.)
  5. Review reports generated by the software.

See also

Related Research Articles

A document management system (DMS) is a system used to track, manage and store documents and reduce paper. Most are capable of keeping a record of the various versions created and modified by different users. The term has some overlap with the concepts of content management systems. It is often viewed as a component of enterprise content management (ECM) systems and related to digital asset management, document imaging, workflow systems and records management systems.

Discovery (law) pre-trial procedure in common law countries for obtaining evidence

Discovery, in the law of common law jurisdictions, is a pre-trial procedure in a lawsuit in which each party, through the law of civil procedure, can obtain evidence from the other party or parties by means of discovery devices such as a request for answers to interrogatories, request for production of documents, request for admissions and depositions. Discovery can be obtained from non-parties using subpoenas. When a discovery request is objected to, the requesting party may seek the assistance of the court by filing a motion to compel discovery.

The Uniform Task-Based Management System (UTBMS) is a set of codes designed to standardize categorization and facilitate analysis of legal work and expenses. UTBMS was produced through a collaborative effort among the American Bar Association Section of Litigation, the American Corporate Counsel Association, and a group of major corporate clients and law firms coordinated and supported by Price Waterhouse LLP. UTBMS codes are now maintained and developed by the Legal Electronic Data Exchange Standard (LEDES) Oversight Committee.

Accounting information system

An accounting as an information system (AIS) is a system of collecting, storing and processing financial and accounting data that are used by decision makers. An accounting information system is generally a computer-based method for tracking accounting activity in conjunction with information technology resources. The resulting financial reports can be used internally by management or externally by other interested parties including investors, creditors and tax authorities. Accounting information systems are designed to support all accounting functions and activities including auditing, financial accounting & reporting, managerial/ management accounting and tax. The most widely adopted accounting information systems are auditing and financial reporting modules.

In business and accounting, information technology controls are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise's internal control. IT control objectives relate to the confidentiality, integrity, and availability of data and the overall management of the IT function of the business enterprise. IT controls are often described in two categories: IT general controls (ITGC) and IT application controls. ITGC include controls over the Information Technology (IT) environment, computer operations, access to programs and data, program development and program changes. IT application controls refer to transaction processing controls, sometimes called "input-processing-output" controls. Information technology controls have been given increased prominence in corporations listed in the United States by the Sarbanes-Oxley Act. The COBIT Framework is a widely used framework promulgated by the IT Governance Institute, which defines a variety of ITGC and application control objectives and recommended evaluation approaches. IT departments in organizations are often led by a Chief Information Officer (CIO), who is responsible for ensuring effective information technology controls are utilized.

Sanitization is the process of removing sensitive information from a document or other message, so that the document may be distributed to a broader audience. When the intent is secrecy protection, such as in dealing with classified information, sanitization attempts to reduce the document's classification level, possibly yielding an unclassified document. When the intent is privacy protection, it is often called data anonymization. Originally, the term sanitization was applied to printed documents; it has since been extended to apply to computer media and the problem of data remanence as well.

Electronic discovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party.

A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated.

EnCase computer forensics software

EnCase is the shared technology within a suite of digital investigations products by Guidance Software. The software comes in several products designed for forensic, cyber security, security analytics, and e-discovery use. Encase is traditionally used in forensics to recover evidence from seized hard drives. Encase allows the investigator to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and Windows Registry information.

Information technology risk, IT risk, IT-related risk, or cyber risk is any risk related to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale.

The terms legal case management (LCM) or matter management refer to a subset of law practice management and cover a range of approaches and technologies used by law firms and courts to leverage knowledge and methodologies for managing the life cycle of a case or matter more effectively. Generally, the terms refer to the sophisticated information management and workflow practices that are tailored to meet the legal field's specific needs and requirements.

Document review, in the context of legal proceedings, is the process whereby each party to a case sorts through and analyzes the documents and data they possess to determine which are sensitive or otherwise relevant to the case. Document Review is a valuable main staple of the type of work performed by attorneys for their clients, though it is increasingly common for the work to be performed by specialized document review attorneys.

Information governance, or IG, is the management of information at an organization. Information governance balances the use and security of information. Information governance helps with legal compliance, operational transparency, and reducing expenditures associated with legal discovery. An organization can establish a consistent and logical framework for employees to handle data through their information governance policies and procedures. These policies guide proper behavior regarding how organizations and their employees handle electronically stored information (ESI).

ZL Technologies was founded in 1999 in Milpitas, California and is a privately held, employee-owned developer of unstructured data archiving software. Its principal product, ZL Unified Archive®, is used by enterprises to consolidate all unstructured data into a single repository for the purposes of information governance—i.e. compliance, legal discovery, records management, file analysis. ZL Technologies' global headquarters is in Milpitas, California, and has international offices in Dublin, Ireland; Tokyo, Japan; and Hyderabad, India.

IT risk management

IT risk management is the application of risk management methods to information technology in order to manage IT risk, i.e.:

Information Discovery is a term used in the legal and corporate industry which refers to the steps involved in distilling a corporation’s data corpus down to the most pertinent evidence pertaining to a court-related matter or compliance directive. The major information discovery steps include: managing the entire data collection in a manner to identify all pertinent evidence associated with the matter, targeting that information for collection, processing and identification (culling) of relevant data, and processing for document hosting and legal document/information review.

Forensic Search is an emerging field of computer forensics. Forensic Search focuses on user created data such as email files, cell phone records, office documents, PDFs and other files that are easily interpreted by a person.

Catalyst Repository Systems is a privately held company based in Denver, Colorado, USA, which develops, hosts and supports cloud-based software for the management of electronic legal discovery. Founded in 2000, the company’s main product is Insight Discovery. Catalyst has offices and data centers throughout the United States, and an office and data center in Tokyo, Japan.

Legal technology, also known as Legal Tech, refers to the use of technology and software to provide legal services. Legal Tech companies are generally startups founded with the purpose of disrupting the traditionally conservative legal market.

The Sedona Canada Principles are a set of authoritative guidelines published by The Sedona Conference to aid members of the Canadian legal community involved in the identification, collection, preservation, review and production of electronically stored information (ESI). The principles were drafted by a small group of lawyers, judges and technologists called the Sedona Working Group 7 or Sedona Canada. Sedona Canada is an offshoot of The Sedona Conference which is an American “non-profit…research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights.”