Category Archives: Government

Legalweek Continues with Sessions on Workplace Data, Privacy, and Ipro’s Happy Hour

Legalweek(year) Recap with Ipro

Legalweek Continues with Sessions on Workplace Data, Privacy, and Ipro’s Happy Hour
Written by Doug Austin, Editor of eDiscovery Today

Last week, I provided a preview for the upcoming Legalweek event, which happened this Tuesday. Here are a few of the highlights from the event in terms of sessions I attended, including (of course) the Ipro happy hour!

Collaboration Data in the Wild: Streamlining Early Case Assessment and eDiscovery for Slack, Teams, and Workplace Data

This session, moderated by Brett Burney of Burney Consultants, opened with some eye-popping stats regarding the use of collaboration apps (especially since the pandemic), including:

  • Every “Internet minute”, Zoom hosts over 208,000 participants in meetings; WhatsApp users share 42 million messages and MS Teams is connecting over 52,000 users
  • Zoom users jumped from 10 million in December 2019 to 200 million in March 2020
  • Teams users grew from 13 million in July 2019 to 115 million by October 2020
  • And Slack has grown to 12.5 million daily active users as of March 2020.

The panel also discussed the Benebone v. Pet Qwerks case that I just covered on eDiscovery Today on Monday (great timing!) regarding production of Slack messages and Jeffrey McKenna, Senior eDiscovery and Privacy Attorney at Orrick indicated the details of that case were “consistent with what we’re seeing in our cases”.

Jessica Mastrogiovanni, General Counsel of Saraca Media Group discussed the in-house concern of not knowing what apps people are using to communicate and stressed an importance to include HR and IT in discussions regarding the use of collaboration apps, involving IT to ensure your company’s security is protected and involving HR to enforce policies associated with the use of collaboration apps.

It’s worth noting that Ipro conducted a webinar last November related to collaboration apps and eDiscovery/Governance titled Taming the eDiscovery and Governance Dragon: Experts Discuss Slack, Microsoft Teams and Other Collaboration Platforms that I was honored to participate in, with Charles Nguyen, Frederic Bourget, and Jim Gill. You can still catch that webinar on-demand here.

Leveraging Microsoft 365 in a Post-Schrems II World

In this session, the panel gave a brief history of the actions filed by Austrian privacy activist and lawyer, Max Schrems, which have brought down both the 15 year old Safe Harbor pact enabling transatlantic data transfers between the U.S. and European Union in 2015 (Schrems I) and its replacement, the Privacy Shield, in 2020 (Schrems II, which I covered here). Jonathan Maas also provides a history of the Privacy Shield “tug-of-war” here.

Among the considerations discussed by the panel was Microsoft’s response to the Schrems II decision, with their press release promising to “challenge every government request for public sector or enterprise customer data – from any government – where there is a lawful basis for doing so” and to “provide monetary compensation to these customers’ users if we disclose their data in response to a government request in violation of the EU’s General Data Protection Regulation (GDPR)”, which “exceeds the EDPB’s recommendations.”

Ethical Considerations in Ediscovery: Rules and Responsibilities

The panelists covered a variety of rules and responsibilities to help attorneys to not only understand eDiscovery, but also to conduct it as efficiently and effectively as possible. When it comes to competency, attorneys should be asking:

  • Does my understanding of technology and eDiscovery meet the adequate requirements?
  • Should I consult my firm’s in-house eDiscovery attorney, or should I consider hiring an expert in technology or eDiscovery?
  • Will taking courses, classes, or reading materials get me up to speed to meet my ethical requirement?
  • Should I even be taking this case based on the technological aspects involved?

The panel also discussed various rules from an ethical standpoint and discussed several cases that illustrated the expectations from courts today on eDiscovery knowledge and competence, as well as what attorneys need to know about TAR and legal holds. They even asked the question: “Is the idea of the billable hour hindering the ethical duty to charge reasonable fee? Hmmm, good question!  And Leeanne Sara Mancari, Of Counsel at DLA Piper, reiterated that the standard for when work product protection and duty to preserve is applicable is the same – the anticipation of litigation. Even better point!

Ipro Happy Hour

The day ended with the Ipro Virtual Celebration/Happy Hour, where we learned to make the “Ultraviolet” drink (1 1/2 oz. citron absolute Vodka, 1 oz. Blue Curacao, 1/2 oz. Grenadine, 1 oz lemon lime soda and garnish – lime, blackberries, or fruit of choice), discussed the recent branding and developments at Ipro (including some information about upcoming product releases in a matter of weeks), and socialized with colleagues.

According to Pierre Chamberland, Chief Innovation Officer at Ipro, the color of the new Ipro logo is “violet, not purple”, which is the first color visible to the naked eye–representing the ability to be able to see into your data as soon as possible–which reflects Ipro’s commitment to extending its capabilities far to the left side of the EDRM model.

And, Ryan Joyce, Senior Vice President at Ipro (who’s been with the company for 18 years), briefly discussed some of the upcoming features and enhancements to the Ipro suite in the areas of analytics and AI, integrations to support the EDRM life cycle from beginning to end, and revamping the handling of messaging and collaboration apps, which (ironically) is where the day started!

For more educational topics from Doug Austin related to eDiscovery, cybersecurity and data privacy, follow, eDiscovery Today! And as part of the continued educational partnership between Ipro and eDiscovery Today, he’ll be here in the Ipro Newsroom next week with more educational content!

Learn more about Ipro’s new branding and product integration.

Putting the “Govern” Into Information Governance

Government building columns with a lock in front of it

Putting the “Govern” Into Information Governance
Written by Doug Austin, Editor of eDiscovery Today

Last year, I published a six-part series associated with EDRM’s Information Governance Reference Model (IGRM) on the Ipro blog. I discussed the five stakeholder groups as a whole here, plus I discussed each of the stakeholder groups (Legal, Records & Information Management (RIM), Information Technology (IT), Privacy/Security and Business Stakeholders) individually.  See what I did there?  I just gave you six more posts to check out for additional information!  You’re welcome!

Seriously, though, each group has different goals and considerations for information within the IGRM model that differ from each of the other groups.  When we talk about organizations that need to consider information governance and how their InfoGov program works, we’re often talking about corporations.  But there’s an entirely different type of organization that also has InfoGov (and eDiscovery) needs – government agencies.  They typically have the same stakeholder groups and many of the same challenges that corporations do, and some additional challenges as well.

The types of government agencies that are out there are practically as diverse as the types of corporations – they range from Federal government agencies like the Department of Justice (DOJ), Federal Trade Commission (FTC) and Securities and Exchange Commission (SEC) to State and Province agencies (i.e., including the US and Canada) to City and County agencies.  And that doesn’t even include Education related agencies like colleges and universities.  It’s pretty typical to think of the needs of government agencies along the lines of Federal agencies, but there are a large number of other government agencies that also have potential InfoGov and eDiscovery needs.

Many government agencies have historically used software to support InfoGov and eDiscovery functions that has been “on-prem” (i.e., contained within the government agency firewall) for security reasons.  However, the use of cloud-based platforms is rising, as Jim Gill just noted in this Ipro blog post here, even for government agencies (in certain cases, at least).

Federal Government Agencies

There are at least two unique considerations that have made unique InfoGov and eDiscovery challenges for Federal government agencies: FOIA and FedRAMP:

FOIA: The Freedom of Information Act (FOIA) is a federal freedom of information law that requires the full or partial disclosure of previously unreleased information and documents controlled by the United States government upon request. The act defines agency records subject to disclosure, outlines mandatory disclosure procedures, and defines nine exemptions to the statute.  FOIA was moved from its original home in Section 3 of the Administrative Procedure Act (APA). Section 3 of the APA, as enacted in 1946, gave agencies broad discretion concerning the publication of governmental records. Following concerns that the provision had become more of a withholding than a disclosure mechanism, Congress amended the section in 1966 as a standalone act to implement “a general philosophy of full agency disclosure.”

Needless to say, FOIA requests are a huge burden for Federal agencies.  The Associated Press reported three years ago that government agencies “turned over everything requested in roughly one of every five FOIA requests” which amounts to receiving either censored files or nothing in 78 percent of 823,222 requests back then (a record over the previous decade).  So, FOIA requests are a BIG challenge for Federal government agencies, one with which they have not coped well recently.

FedRAMP: The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with emphasis on security and protection of federal information, and helps accelerate the adoption of secure, cloud solutions.  So, for government agencies considering cloud-based solutions for InfoGov and eDiscovery, that means they can consider use of those solutions – assuming they are FedRAMP authorized.  FedRAMP authorization typically takes time – at least 213 days from the start of the approval process to FedRAMP approval.

Other Governmental Agencies

State (and province), county, city and other types of governmental agencies don’t have FOIA and FedRAMP to deal with, but they do have other considerations that can be equally challenging.  Many state and local jurisdictions may be involved in multi-state or multi-district litigation cases (MSLs or MDLs) against corporations over health issues related to substances such as tobacco (in years past) or opioids (today) which can be a lot of work that may or may not pay off.  And there are numerous cases at the state and local level that these agencies may need to be prepared to address.  Want a recent example?  Take a look at all of the litigation already arising from the power grid failure in Texas just two weeks ago (don’t get me started).  For these government entities, InfoGov needs and eDiscovery requirements are comparable to any organization, but budgets are tight and cost predictability is paramount.

So, when we think of organizations with InfoGov and eDiscovery needs, don’t forget the government agencies – they literally put the “Govern” into Information Governance!

Speaking of government agencies, Ipro is currently conducting a Government survey to provide useful information on current InfoGov and eDiscovery challenges for government agencies.  If you work for a government agency and are involved in InfoGov or eDiscovery activities, please take the survey here – it’s a simple 10 question, multiple choice survey that literally takes a couple of minutes.  When the results are complete, Ipro will compile them into shareable infographics and videos to give government agencies a benchmark for assessing their current legal processes.  Don’t miss this chance to share your knowledge and help your peers!

For more educational topics from Doug Austin related to eDiscovery, cybersecurity and data privacy, follow, eDiscovery Today! And as part of the continued educational partnership between Ipro and eDiscovery Today, he’ll be here in the Ipro Newsroom next week with more educational content!

Coming Full Circle with the 2021 ABA TECHSHOW

ABA Techshow

Coming Full Circle with the 2021 ABA TECHSHOW
Written by Doug Austin, Editor of eDiscovery Today

As we get closer to one full year since the pandemic changed our way of life, it’s worth noting that the last in-person conference that many of you may have attended was last year’s ABA TECHSHOW, which was conducted February 26-29 at the Hyatt Regency Chicago (yes, 2020 was SO challenging, we had to endure 366 days last year).  This year’s ABA TECHSHOW (like many other conferences) will be virtual, but still a very exciting event, as it always is!

This year, the ABA TECHSHOW will be conducted from March 8th through March 12th.  It begins with the Start-Up Pitch Competition at 11am ET on Monday, March 8th, where “ABA TECHSHOW will host a startup competition showcasing 15 innovative legal startups that will face off in a pitch competition – judged by TECHSHOW attendees – to pick the most innovative startup for the year”.  It concludes with the 60 in 60 session on Friday, March 12th at 3:45pm, which provides “an hour of the latest in apps, work hacks, hot technologies, and more”.  And there are plenty of interesting other sessions in between – there’s literally a full week of legal technology education!  Here are some of the highlights (all times ET):

  • Monday: Ethical AI: Playbook for a Rapidly Changing World (2:15pm), Data Security and Privacy for Lawyers (4:30pm);
  • Tuesday: Lawyer’s Guide to Zoom (11:15am), The Amazing Depth of Cyber Investigations (1:00pm), How Attorneys Get Hacked (and What You Can Do About It) (2:45pm);
  • Wednesday: Best Practices for Securing Your Virtual Practice (11:15am), Is Legal Innovation an Oxymoron? (1:45pm);
  • Thursday: Outsourcing as an Efficiency Tool (3:45pm), Mixing People and Automation: Finding the Sweet Spot (also at 3:45pm);
  • Friday: The Future of AI, Mindmapping, and Online Dispute Resolution (11:15am), Cloud Based E-Discovery for Small Firms (12:00 pm), Artificial Intelligence and Analytics in Litigation and Beyond (2:15pm, with Maura Grossman!).

The schedule of sessions is available here organized by day and available here in a PDF file organized by day and topic.

As for CLE credit, the ABA will seek 15 hours of CLE credit in 60-minute states, and 18 hours of CLE credit for this program in 50-minute states including 3 hours of CLE ethics credit in 60-minute states and 3.6 hours of CLE ethics credit in 50-minute states. Credit hours are estimated and are subject to each state’s approval and credit rounding rules.  And, even though all sessions will be recorded and made available to view for at least 30 days post-show, only live attendance at sessions will give you CLE credit.

The Full Conference rates for all five days of the conference are $295 for an ABA or LP member, $350 for a Non-Member (Government/Professional Affiliates/Standard).  So, that’s no more than $350 for an entire week of great educational topics!  The cost is only $25(!) for a Law Student (provided they’re an ABA member, which is free).  Single-day passes for all attendees are $175, so, unless only one day of sessions interests you, it’s a significantly better value to register for the entire conference.  Note: prices for all will go up after 3/5, so you’ll want to lock in before that for the best rates.  Here’s the page with complete pricing info and to register for the event.

And there will still be a TECHSHOW EXPO this year!  There are a number of sponsors who will be participating this year, including Ipro.  You can request a meeting with Ipro at the ABA TECHSHOW here – it’s a great opportunity to learn about exciting development with the Ipro product suite!

ABA TECHSHOW is always one of the most unique conferences of the year – it’s probably the conference that has the widest appeal and participation across the spectrum of law firm and legal professionals, from solo and small firms to Am Law 100 firms, large corporations and government entities.  It’s truly a conference for everybody in legal technology!  Hope to see you there!

For more educational topics from Doug Austin related to eDiscovery, cybersecurity and data privacy, follow, eDiscovery Today! And as part of the continued educational partnership between Ipro and eDiscovery Today, he’ll be here in the Ipro Newsroom next week with more educational content!

Stacks on Stacks: Survey Shows Increased FOIA Requests Still a Challenge

FOIA Requests Survey

Stacks on Stacks: Survey Shows Increased FOIA Requests Still a Challenge

JD Supra Readers Choice Top Author 2020Written by Jim Gill
Content Chief, Ipro


Today’s eDiscovery Blues cartoon gives a nod to our colleagues working in government agencies processing FOIA requests. By law, all federal agencies are required to respond to a FOIA request within 20 business days, unless there are “unusual circumstances.”

The number of requests per year has continued to rise over the past decade, with 858,952 requests in FY 2019 alone, according to the DOJ. Along with this rise in requests, comes an increase in data to search through. So not only are more requests coming in, there is a larger data landscape to sift through in order to find relevant documents.

FOIA Requests Survey

In a recent Ipro webinar series, we discussed various challenges with FOIA officers and analysts in order to take a look at what’s going on currently in the field. In our discussion on 7/29, we surveyed the audience and each question’s leading response points back either to the volume of requests or the need to narrow the scope of the request.

Biggest FOIA Challenges Within Agency

  • Volume of Requests: 40%
  • Responsiveness from Other Depts: 33%
  • Working Remote: 18%
  • Complex Redactions: 10%

Biggest Challenges Working with Requestors

  • Getting Requestor to Reduce Scope: 51%
  • Timely Response from IT: 34%
  • Clarifying Request from IT: 12%
  • We Manage Email Requests Just Fine: 2%

Biggest Challenges with FOIA Requests for Emails

  • Getting Requestors to Narrow Score: 39%
  • Expert vs. Novice: 33%
  • Requests for Expedited Treatment 25%
  • Requestor Appeals: 3%


Leveraging Technology for FOIA / PRR

Many agencies are still trying to meet these challenges with manual processes and off-the-shelf software combinations (such as Outlook, Excel, and Adobe). As data volumes and request volumes continue to grow, this becomes a daunting task at best, even if there were an increase in personnel.

This is where technology specifically designed to manage large datasets and quickly find responsive documents can make life much easier for FOIA officers.

Here are a few tools to consider:

De-Dupe / Near-Dupe

These are exactly what they sound like:

De-Duplication (or De-Dupe) identifies and removes duplicate documents on ingestion, greatly cutting down on the document count which must be searched.

A tool which finds Near-Duplicates (or Near-Dupe) uses analytics to find nearly identical documents. This tool can even identify the percentage of duplicate content and conduct side-by-side comparisons of documents, highlighting differences.

Email Threading

This is a tool that identifies email relationships (threads, people involved in a conversation, attachments, and duplicate emails) and groups them together as one coherent conversation. It also gives you the ability to locate the terminal email in a thread, which contains all previous emails leading to it. By looking at the terminal thread, it cuts down searching through multiple emails containing the same content.

Concept Clustering

Concept Clustering is true to its name. It visually groups documents into keyword groups or clusters, allowing you to quickly get an understanding of the data landscape, with the ability to make connections nearly impossible with linear review.

Connecting Directly to Data Sources

By connecting directly to data sources (such as an organization’s email servers, sharepoints, and messaging apps) it allows the FOIA officer direct access to data, rather than having to contact those departments or their IT and request data.

Redaction Tools

Rather than use off-the-shelf tools like Adobe to manually create redactions, the same tools used to search and cull documents, can also create redactions that remove the text under the redaction, run validations to make sure the redactions are burned in and the text is correct, and create layered redactions, so multiple production sets can be sent to multiple parties. They can even identify documents which may need another layer of review before they’re produced, similar to an email platform asking if you want to send without a subject line or if you’ve forgotten an attachment.


Even with the growing number of FOIA requests and the challenges highlighted in this survey, Government Agencies can easily meet the 20-day deadline by leveraging technology and taking advantage of some of the tools listed above, giving officers an edge when it comes to working through those towering stacks (whether they are paper or digital) coming into their inboxes.

In case you missed our 3-Part FOIA Webinar Series featuring expert practitioners discussing best practices, listen on-demand here!


More than Drawing a Black Box: How to Get Redactions Right for eDiscovery Production

How to Get eDiscovery Redactions Right

More than Drawing a Black Box: How to Get Redactions Right for eDiscovery Production

JD Supra Readers Choice Top Author 2020Written by Jim Gill
Content Chief, Ipro

For most people, redacted documents are the material of spy movies and political scandal. But here in the world of eDiscovery and FOIA requests, they’re a part of everyday life. But that doesn’t mean they’re to be taken lightly! Failure to redact documents or to make sure that redacted content is produced in its redacted format can be case ending (and job ending for the person responsible for the error).

The most common reason this happens, is because law firms and government agencies are taking the “redact by hand” route instead of using tools that properly manage productions to ensure documents meet the expected requirements, making sure the information meant to be kept private is hidden.

Even with redaction technology in place, some file types (like spreadsheet documents) can be difficult to redact, as we see in this week’s eDiscovery Blues™ comic. These challenging file types result in the litigation support or FOIA personnel using Microsoft Office and Adobe Acrobat to draw black boxes over the sensitive material, which is fine if the documents are going to be printed to hardcopy but doesn’t actually redact the digital information from the file.

In one 2019 grand jury filing, a member of the press was able to defeat these types of manually created redactions by simply copying the black-out boxes and pasting the text into a new document, which also brought over the text and metadata.

So how can you make sure redactions on digital documents are done correctly?

“That’s kind of the challenge: picking the right tool for the right job,” says Derek Miller, VP of Business Development at Ipro. “Anyone doing redactions and producing redacted documents needs to understand how these tools work and build measures into their processes to avoid this type of mistake. But mainly you want to make sure you have the right tools in your toolbox. Which means using software that’s specifically designed to redact and produce those redactions accurately.”

Here are a few things to look for in software to ensure accurately produced redactions:

  • Automatically re-OCRs documents to remove the text under the redaction
  • Runs validations to make sure the redactions are burned in and the text is correct
  • Creates layered redactions so multiple production sets can be sent to multiple parties

Along with those functions, some eDiscovery software has added protections which identify documents which may need another layer of review before they’re produced. It’s similar to when your email platform asks if you want to send without a subject line or asks if you’ve forgotten an attachment.

One example of this is Ipro’s Production Shield™, which identifies these documents during the validation phase of the export process, giving administrators the opportunity to correct conflicts and ensure only appropriate documents are produced.

The main thing to remember when dealing with Electronically Stored Information (ESI) is that what you see on the screen is only the surface of the existing data. The same goes getting redactions right for eDiscovery: Just because all you see is a black box, doesn’t mean everything that lies beneath has disappeared.

Ipro’s Production Shield™ is available on Ipro’s Enterprise™ and Desktop™ eDiscovery Solutions.

How Government Agencies Walk the Line with Legacy Software

Government agencies legacy software

How Government Agencies Walk the Line with Legacy Software

JD Supra Readers Choice Top Author 2020Written by Jim Gill
Content Chief, Ipro

Have you ever cleaned out your closet and found that shoebox full of cassettes from college? Companies and government agencies are no different. Many of their electronic files are stored as legacy file types which are no longer supported. And these aren’t just files that are of little significance.

In an article from October 2019, Ars Technica reported that the U.S. Air Force’s intercontinental ballistic missile command had finally stopped storing data on 8-inch floppy disks. You read that correctly: data from active nuclear missile sites was being captured and managed using 40+ year-old technology. The Air Force cites the use of these legacy systems as a cybersecurity advantage, and even though data is now stored on a “highly secure solid state digital storage solution,” the Strategic Air Command still relies on IBM Series/1 computers installed at Minuteman II sites in the 1960s and 1970s.

One of the biggest challenges with legacy systems is that they work fine as long as things remain “business as usual.” But when outside events change the status quo, unforeseen weaknesses and challenges can arise quickly.

With the COVID-19 outbreak in early 2020, the number of applications for benefits from the CARES Act, passed in late March 2020, overwhelmed state employment offices. A good deal of the gridlock was state agencies relying on a 60-year-old programming language called COBOL, causing claims to take as long as two weeks to process.

As Robin Roberson, executive director of the Oklahoma Employment Security Commission, put the situation, “Our mainframe is literally over 30 years old. It’s very difficult to program, it doesn’t do much, [and] COBOL programmers are somewhat scarce.”

State agencies across the country are scrambling to update COBOL code, but according to Gartner, the average age of a COBOL programmer is above 60. Mahmoud Ezzeldin, 75, who was a COBOL programmer for Blue Cross Blue Shield and the IRS, offered to come out of retirement and volunteer help in training organizations updating their systems to meet the increased demand for relief benefits.

From an eDiscovery perspective, legacy data can prove a challenge as well. Government agencies, corporations, and law firms all most likely have some legacy data they may have to contend with regarding investigations, litigation, and FOIA or other compliance requests. As this week’s eDiscovery Blues cartoon highlights, these organizations may have the information required, but getting that data into a format that is reviewable and producible is where the challenge lies.

Which is why it’s important to work closely with your IT department to know if your organization has any potential legacy data obstacles, as well as ensuring that you have an eDiscovery technology partner who can effectively and efficiently manage those challenges.

Otherwise, you may end up like Rick Compliance, eDiscovery Manager, scouring the internet for used floppy drives.

Read More about How Your Legal Team is Being Held Back by Legacy eDiscovery Software


Why eDiscovery Software is the Perfect Solution for FOIA Requests

FOIA eDiscovery Software

Why eDiscovery Software is the Perfect Solution for FOIA Requests

Written by Jim Gill
Content Chief, Ipro

As far back as 2013, the Department of Justice has received over 70,000 Freedom of Information Act (FOIA) requests per year, and this trend continues to rise. By law, all federal agencies are required to respond to a FOIA request within 20 business days, unless there are “unusual circumstances.” If the requests don’t receive a response to according to law, the agency can be sanctioned, as well as those individual employees, “…who are found to have acted arbitrarily or capriciously in improperly withholding records. Additionally, the court must award attorney fees and other litigation costs against the government.”

This puts a lot of pressure on the FOIA personnel assigned to perform all duties related to the processing of these requests: logging, tracking, searching for responsive records, analyzing responsive records for disclosure pursuant to FOIA provisions, applying exemptions to the documents as appropriate, and communicating with the FOIA requestor. These tasks become all the more formidable when trying to manage them with manual processes and basic tools.

One example of this involves the FOIA administrator at one of the agencies within the Department of the Interior. Their old process was manually searching email, native files and images, opening each one individually in Outlook, changing the metadata, and then making the decision on whether the document was relevant to the FOIA request. They used an Excel workbook to catalog document names since there were no other Document IDs to use as a reference. Needless to say, this proved to be a very labor-intensive process, not to mention that the data was spoliated when changes were made to the file headings and any related metadata.

As an added challenge, if redactions were needed, the documents had to first be converted into PDFs and then redacted manually, using a program like Microsoft Word or Adobe. As Ryan Joyce, VP of Strategy at Ipro, shares, “Time and time again we have seen the same headline—a law firm or government agency warding off the trouble caused by not handling their redactions correctly. Why is this still an issue after all these years? In reality, any software can place a colored box over text, but only the right eDiscovery solution will provide the correct and federally mandated result.”

This is where eDiscovery solutions designed with the specific result of making life easier for FOIA personnel come into play.

The dilemmas listed above are easily solved by a single tool with the features listed below:

  • Quickly ingest and OCR a large variety of file types that may be a part of a public request
  • Advanced search tools allow the finding of relevant documents in a fraction of the time
  • View text and metadata at the same time, without spoliation
  • Near-duplicate detection and email threading eliminates the need to review similar documents
  • Reporting features easily log and track documents
  • Alerts prevent redaction errors and ensure DOJ-quality productions
  • Create multiple productions if variations of a FOIA request are required

It’s clear that the challenges of FOIA requests can be daunting, so creating awareness is critical: the right solution for Government Agencies already exists in eDiscovery software originally created for litigation purposes.

When you would like to learn more how Ipro eDiscovery solutions help Government Agencies
meet the challenges of FOIA requests, take a moment to visit us here.

What Should Be in the Small Law Firm eDiscovery Toolbox: The Lawyerist Interviews Derek Miller

small law firm eDiscovery

The small law firm is often left out of the eDiscovery conversation. Faced with choosing an enterprise tool, sticking with legacy eDiscovery software that is no longer being developed, or the old standby, manual processes, it might seem that small firms are left little in the way of eDiscovery options.

But that isn’t the case. Recently, The Lawyerist interviewed Derek Miller, VP of Desktop Solutions at Ipro, on several of their podcasts, talking about just that: eDiscovery tools small law firms should keep in their toolboxes.

Why Do Small Firms Need to Care About eDiscovery?

Derek Miller: I have a firm that I work with here in Phoenix, a small firm, two attorneys and two paralegals. And they’ve decided to use technology from start to finish. From the first meeting with a client, they start a chronology on what they’re going to produce, and what they’re getting from opposing counsel. And they start with electronically created information and images, which means someone has to process it and work with it. So they use our desktop software to ingest that information, review, and produce it. They also manage their transcripts and synchronized video, and they build the entirety of their case through the use of this technology.

At every stage, they’re reviewing, producing, scanning, coding data, and putting it into a product that will allow them to then take all of that information and transition it through the litigation life cycle and then go into trial and present that information. Ironically, everyone has to prepare as if they’re going to trial; whether or not they end up there is dependent upon the case. And because they’re using technology at every stage, they’re already familiar with the facts all the way through, solidifying their strategy.

Lawyerist: They don’t have to wait until pre-trial, or even discovery, they’re ready to go from the beginning of the intake process. That sounds like a pretty powerful way to approach trial prep and litigation in general.

Derek Miller: I think so. And because they’ve adopted the software and are using it through the whole process, they don’t have to relearn it each time when they get to a certain stage. It’s just a natural part of the practice.

Lawyerist: How would a firm get started using technology like that?

Derek Miller: That’s a great question. First, go out and evaluate a couple of different products, decide what it is that you’re trying to do, and then how a particular software fits that goal.

Secondarily, I would invest heavily in the training. Once you become familiar with the software, then make that a part of your workflow.

Fact Management:

Lawyerist: What’s a tool that you think should be in every litigator’s toolbox?

Derek Miller: I think one of the tools that can be really helpful, and that’s a little bit underrated, is a Fact management tool.

Lawyerist: What is a fact management tool?

Derek Miller: It’s a tool that bridges the gap between the discovery/production phase of litigation and the trial phase. And with every case, you should be preparing as if you are going to trial, even if you don’t ultimately end up in the courtroom.

Lawyerist: I’m imagining that a fact management tool uses key facts, material facts, extraneous facts, as the central organizing principle, and my assumption is that it helps me organize what those facts are and identify why they might matter, helping me draw connections between them.

Derek Miller: Yeah, I think one way to think about a fact management tool is it’s like one of those photographic mosaics, where you’re trying to take a bunch of those little individual pictures and turn it into one big picture. And with litigation, you start with one big picture in mind, and then with all the little pictures you’re given, you try and paint it so it’s accurate and clearly seen. Sometimes that’s harder to do, because you’re stuck with all these little pieces of evidence, and you have to align those with all of the facts and issues of the case. A fact management tool can help you do that. You have to have the ability to manage witnesses, documents, testimony, and a chronology, and the ability to visualize “what happened when” is a key part of painting that picture.

Lawyerist: You just mentioned a chronology, what are some other key features you want to look for in a fact management tool.

Derek Miller: Something that ties together facts and the evidence that goes with it, whether that is a document, an email, a video, a transcript testimony from a deposition, any of those are all key pieces you want to manage. Additionally, you don’t want a tool that’s a bridge to nowhere. And what I mean by that, is that it would be great if all the effort and work product was going to transition easily into whatever you’re going to use for trial.

Lawyerist: Because the idea here, is that whenever I see a fact, it’s providing me with the additional context. So I know what that fact means, what the significance is, if it turns out to exist or not exist, if the fact is disproved or proved, and what that means for my case, and what are the documents I’m going to need to prove it up or disprove it.

Derek Miller: You’re right, and then which witness is going to testify and who’s going to introduce that evidence to help you out.

Lawyerist: Is this something that will work with my presentation software, or is this just something I would use myself on my laptop at my desk?

Derek Miller: It could be either/or. As I mentioned earlier, it could be something that’s going to transition that work product right into the trial software, so that if you do end up in the courtroom, you’re not redoing that work. It’s all going along for the ride.

Lawyerist: And that’s the philosophy behind Ipro, right? It’s something you begin using at the beginning of the case that helps you along the way, and then it also turns into a fact management tool as you need it to be, and it also helps you present your case at trial, and handles the whole lifecycle of the case.

Derek Miller: Exactly. We’re all about simplifying that entire process, from the start of discovery all the way through trial.

Redaction Woes:

Lawyerist: You were telling me about some PDF redaction disasters you were seeing recently that show what happens when you use software correctly, but for a purpose which it was not intended. Tell us what you’ve seen.

Derek Miller: Recently in the news, there was the story of the redacted information that was erroneously or accidentally exposed because of the tools that were used to do the redaction. It’s probably not the first or last time that will happen, but in this instance, it was an issue of understanding how the technology works versus the software itself, and that can be the bigger problem when it comes to selecting tools for the toolbox.

Lawyerist: So in this case, remind me, what was the situation and what was the tool that went wrong?

Derek Miller: Basically, the situation was they went through and they redacted some grand jury information, and the software did work as it was intended, and it did redact, but that doesn’t mean it was permanent or fixed, so an outside party was able to highlight, copy, and paste, and then show that redacted information in another document.

Lawyerist: This was the kind of situation where, someone drew black boxes over the document, which works if you’re going to print it, but doesn’t actually redact the digital information from the file.

Derek Miller: Correct. When you have an image or text, you can put a black box over it all you want, but the underlying data is still there. So while they did choose a redaction tool, they didn’t double check to make sure the information wasn’t still available.

Lawyerist: So how can lawyers make sure that when they are redacting PDF documents or other digital documents, they’re doing it correctly.

Derek Miller: That’s kind of the challenge: picking the right tool for the right job. Based on this recent experience, anyone doing redactions and producing redacted documents is going to understand how those tools work and be a little more careful so they avoid this type of mistake. But mainly you want to make sure you have the right tool in your toolbox. So use software that’s specifically designed to redact and produce those redactions accurately. And as far as the functionality of the software, you want to make sure it does a couple of things like automatically re-OCR the document to remove the text under the redaction, run validations to make sure the redactions are burned in and the text is correct, and then be able to create layered redactions so that multiple production sets can be sent to multiple parties.

In addition to those functions, in the Ipro for enterprise and Ipro for desktop products, there is a feature called Production Shield which identifies those types of documents that need that added layer of review before they’re produced.

Lawyerist: Which can keep you from making mistakes. Kind of like the email feature that reminds you when you’ve forgotten to attach something.

Derek Miller: Exactly. In a similar way that your email will ask, “Are you sure you want to send?” or “Did you mean to attach documents?” Production Shield works in a similar way where it says, hey, you may want to check these documents to make sure the redaction is correct and there’s no underlying text that could inadvertently get disclosed.

Lawyerist: That sounds pretty handy! Thanks so much for being with us today, Derek.

Derek Miller: Thank you.


Find out how 5 legal teams overcame their challenges, utilizing Ipro’s Hybrid approach to eDiscovery.

Download the eDiscovery Adventure Guide Today!

Ipro eDiscovery Adventure Guide

5 Reasons Your Legal Team is Being Held Back by Legacy eDiscovery Software

legacy eDiscovery software

We’ve all been there: we know we need to change our way of doing things but are stuck in the status quo. We tell ourselves, if it isn’t broken, why fix it, because the thought of going through the difficulty of evolving often overshadows any benefits that might come with updating.

Those of us working in eDiscovery are no different. Even as digital information is constantly growing, file types changing, and processing and review costs continue rising, we hang onto outdated software that becomes more and more unstable with age—from limited processing capabilities, issues with filetype compatibility, or a lack of continued development and support.

Here are 5 reasons why continued use of unsupported legacy software is a ticking time bomb in your eDiscovery process.

  1. Tech Support

This is an obvious one. Using legacy eDiscovery software that is no longer supported by the company that created it is like driving a car with high-mileage and no warranty: it may still run fine and get you from point A to point B, but when it breaks down, you’re on your own.

  1. Operating System Support

As far as digital lifespans go, 5 years is a long time. If your legal team is using legacy eDiscovery software which was created for older versions of an OS, it could lead to issues if it’s no longer being supported to meet with scheduled OS updates. (For example, Microsoft released Windows 10 in 2015, which has had 7 additional versions updates since then, with various “end of service” dates scheduled in 2020).

  1. File-type support

It’s no secret that data is growing exponentially each year, particularly in the corporate sector. From an eDiscovery standpoint, the challenge lies with the near infinite number of file types (and variations within each type) in which data can live. Every program and application you use creates different file types: email, chat, social media, planning and content-creation tools, etc. Different versions of the same program or application create variations of those file types, and different formatting within each of those can create still more variations. From this perspective, it’s easy to see why a legal team needs software that is continually being updated in order to keep up with this growth.

  1. Lack of advanced tools and analytics for today’s workflows

More and more, legal teams are looking to add the latest tools which increase the speed, accuracy, and efficiency of document search and review. If your team is using software that is no longer being developed or supported, you may be missing out on the latest innovations in Early Case Assessment (ECA), Technology Assisted Review (TAR), and other advanced technology which allows your team to deal with larger datasets and take on more complex cases.

  1. Difficulty meeting unique production requirements

FRCP Rule 34(b) states that a requesting party may specify the form or forms of ESI production, which are determined by the parties at the Rule 26(f) “meet and confer” conference. The inability to meet unique production requirements due to outdated or unsupported software will result in having to turn to outside service providers to do the job for you, resulting in extra costs and added stakeholders, in order to meet the production deadline.

Functional Software isn’t a Long-Term Solution

It’s time to stop struggling with legacy eDiscovery tools. Ipro easily migrates data from the most popular legacy flat-file review databases and has been purpose-built with the most cutting-edge features in eDiscovery. No matter what your eDiscovery needs are, Ipro has the flexibility, scalability, and value to meet them.


Register for Ipro’s upcoming webinar:

eDiscovery from the Trenches: 3 Veteran Practitioners Discuss How to Create a Successful eDiscovery Workflow

Fitbit Data Provides Clues in Murder Case: eDiscovery & Criminal Investigation

ediscovery criminal investigation

Once again, eDiscovery and emerging data sources are at the center of a criminal murder investigation. A recent article in Wired highlights how investigators used data from the victim’s Fitbit and a neighbor’s Ring digital doorbell camera to establish a timeline, identify a suspect (the victim’s 92 year-old step father), and gain a warrant to search the suspect’s home, all of which led to his arrest.

Similar to other cases involving the use of data from mobile phones, social media, and the Internet of Things, it wasn’t the electronically stored information (ESI) alone leading to the arrest, but instead it gave investigators leads that otherwise wouldn’t have existed in a pre-digital world. These leads then gave them enough evidence to request warrants for further searches and investigations of specific suspects, which then brought about arrests. In other words, solving crimes still boils down to good old-fashioned detective work, only now, investigators have new ways to uncover what might have happened and who may have been involved.

Fitbit first introduced its personal fitness tracking device ten years ago, and today around 27 million people use them. Add that to other competitor’s devices (such as the Apple Watch) and it’s not hard to imagine how investigators often have ready access to biometric data of suspects and/or victims. Last year alone, 170 million wearables were shipped worldwide.

But while much of electronic data is self-authenticating under Federal Rules of Evidence rule 902(14), biometric data gathered from wearable devices is much harder to authenticate as accurate. An analysis of 67 studies on Fitbit’s movement tracking concluded that, “the device worked best on able-bodied adults walking at typical speeds. Even then, the devices weren’t perfect—they got within 10 percent of the actual number of steps a person took half of the time—and became even less accurate in counting steps when someone was resting their wrist on a walker or stroller, for example. ‘It’s not measuring actual behavior,’ says Lynne Feehan, a clinical associate professor at the University of British Columbia and the lead researcher on the paper. ‘It’s interpreting motion.’”

Evidence from fitness trackers has been admitted in homicide cases in Europe and the US, but expert witnesses and analysts are often used in conjunction with the data to authenticate it. Only a few judges have ruled on how to handle evidence from fitness trackers. For example, “In a 2016 Wisconsin case, Fitbit data was used to eliminate the possibility that a woman was murdered by her live-in boyfriend. The judge ruled that an affidavit from Fitbit established the device’s authenticity and allowed lawyers to introduce its step-counting data; at trial, a sheriff’s department analyst vouched for the reliability of the man’s particular device. However, the judge barred the Fitbit’s sleep data, citing a class-action suit that claims the sleep tracking could be off by as much as 45 minutes.”

Similar to older technologies (such as the polygraph), electronically created data isn’t necessarily irrefutable. Antigone Peyton, an intellectual property and technology law attorney who has used data from wearables in civil cases, states that people tend to see “data is equivalent to truth,” but there are “many ways the information on these devices can be interpreted.”

Another aspect that investigators have to consider with this type of data is users’ privacy. Last year, the Supreme Court ruled that police must have a warrant to search phone location data under the 4th Amendment. At times, the companies that have the data, refuse to hand it over to law enforcement if they feel privacy is being infringed upon, but largely, the tech industry seems to cooperate, especially as procedures for handling this type of data are becoming more defined.

What is important for the legal industry to consider is how different types of data and data sources work, and what that means when it comes to authenticating it. It’s similar to when wiretaps, phone data, and other electronic surveillance was introduced into the detective’s toolkit in the 20th century. The difference is the amount of information created today is much greater, and it’s created by every person on a near continuous basis from a large number of sources. And none of this data can be looked at in the same way.

But what this new data does provide is more ways to reconstruct scenes, rule out potential suspects, corroborate or contradict testimony, and gather information which allows investigators to pursue new tactics and lines of questioning which lead to further warrants and arrests. For attorneys, it’s important to stay up on the most recent investigative uses and court-rulings on these data sources, which will continue to define and clarify how ESI is being used in both criminal and civil cases.


Written by Jim Gill
Content Writer, Ipro


Need to brush up on your Federal Rules of Civil Procedure as they apply to eDiscovery?
Download Ipro’s FRCP Cheat Sheet!