IST Discover-E Index of Terms
eDiscovery lingo into its most simplistic terms.
The amended Federal Rules of Civil Procedure (FRCP), recent headlines highlighting spoliation sanctions, and rising costs have made eDiscovery a top priority for legal, IT, security, and records management teams. However, there seem to be no precise, concise definitions available that can truly put boundaries around the process. It becomes sort of an umbrella phrase that essentially deadens decision making from senior non-technical decision makers. The following index of eDiscovery terms breaks down eDiscovery lingo into its most simplistic terms and provides a homogenized basis to help guide eDiscovery decision makers’ process.
Native
Natural Language Search
A manner of searching that does not require formulas or special connectors (e.g. ,“origin” and “basketball”), but can be performed by using plain statements (e.g., “What is the origin of basketball?”).
Near Duplicates
The process of identifying and culling documents that are nearly duplicate. Deduplication software can group near duplicate documents by percentage of similarity, so reviewers can quickly review and code documents for responsiveness or privilege. See Deduplication.
Near Native
Functionally the same as native. Because some things can’t really be produced in the application that created them, then we call the next best thing near-native. An example is an email generated in Gmail.
OCR Text
Optical Character Recognition; searchable text that corresponds to a document image; an OCR software program designed to “read” a document image generates OCR text. OCR serves to pair the images of letters with their electronic counterparts and impart a rough approximation of searchability.
Off-line Storage
Storage of electronic records on a removable disc or other device for disaster-recovery purposes.
Overwrite
To copy or record new data over existing data, as with backup-tape recycling or when updating a file or directory. Practice Note: Overwritten data cannot be retrieved, making it important to suspend policies and procedures likely to result in the overwriting of potentially relevant data, once on notice of the duty to preserve.
Peripheral
Refers to a device that attaches to a computer, such as a printer, modem or disk drive.
Predictive Coding
A method of culling relevant documents for production or review. Predictive coding uses algorithms to determine the relevance of documents based on linguistic and other properties and characteristics. It relies on the coding from a human sampling of documents called a “seed set.” The seed set allows the computer to identify and evaluate the remaining documents. Also referred to as IRT or TAR.
Preservation
The process of managing, identifying, and retaining documents and other data for legal purposes. Practice Note: Reasonable efforts to preserve include the suspension of routine deletion policies, issuance of adequate preservation instructions and oversight as appropriate. Delegation is not a defense when evidence is lost, altered and/or destroyed after a parties’ duty to preserve arose.
Preservation Demand
A letter or email to your adversary demanding that he or she keep evidence safe and prevent it from being destroyed. Sometimes critical to point to when seeking sanctions at a later date if the other side “lost” some evidence. Preservation demands are often wildly over broad, but hey, how is the sender supposed to know what the receiver has and doesn’t have?
Privilege Data Set
Processing
This is the second most overused and under-defined term in our industry. Every attorney, corporation, and service provider defines processing differently. It can include the Electronic Discovery Reference Model (EDRM), information governance, the cloud, social media, and big data.
Production
The process of producing or making available for another party’s review the documents and/or other ESI deemed responsive to one or more discovery requests.
Program
See Application and Software (synonymous with software).
Propagation
An eDiscovery coding term for the action of adding code to document families, duplicates, near-duplicates etc.
PST (or Personal Storage)
A personal folder file in Microsoft Outlook with a super handy file format for wrapping up huge numbers of emails and attachments in a way that preserves their ability to be searched. We like PSTs. Ask for them often, but remember that compressed files expand during processing.
Records Manager
The person responsible for implementation of a records management and information governance program.
Records Retention Period (or Retention Period)
The length of time a given set or series of records must be maintained. The retention period is often expressed as a period of time (such as six years), an event or action (such as completion of an audit), or both (six years after completion of an audit).
The intentional concealing of a portion of a document or image, done for the purpose of preventing its disclosure. Practice Note: Redactions and their basis should be clearly indicated and disclosed to avoid an appearance of bad faith.
Restore
Transferring data from a backup medium to an active system. Data is often restored for the purpose of recovering the data after a problem, failure or disaster, or where the data is relevant and has not been preserved or cannot be accessed elsewhere.
Review
Review Platform
Software like Relativity for examining electronic evidence--either your own or the other side’s. Can be hosted in a “cloud” environment--in which case expect to pay by GB, and don’t say I didn’t warn you. Alternatively, software that runs on one’s desktop. Ranges from inexpensive to insanely expensive. More often the latter. We’re trying to change this.
Sampling
Usually refers to any process of which a large collection of ESI or a database is tested to determine the existence and/or frequency of specific data or types of information.
Seed Set
The initial set of data/documents used in predictive coding. The seed set is “trained” by learning algorithms to cull data down to a potentially relevant set for reviewers to analyze for production or privilege. See Predictive Coding. Practice Note: Cooperation between counsel as to methodology and selection of the seed set(s) can avoid challenges down the road as to whether sufficient efforts were made to cull the data for relevant documents, as well as allegations that relevant evidence was withheld.
Social Network
A group of people who utilize social media, typically based on a specific theme or interest. Facebook is an example of a popular social network.
Social Media
Web sites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts: Many businesses are utilizing social media to generate sales. Do NOT neglect this source of ESI. It is easy to collect and review; and can potentially change the outcome of a case.
Sources
Spoliation
The destruction of evidence and information that may be relevant to ongoing or reasonably anticipated litigation, government audit or investigation. Courts differ as to the requisite level of intent required for imposition of sanctions, with fault (possession and failure to preserve) on one end and willfulness on the other.
System Files
Nonuser created files that permit computer systems to run.
TAR (Technology Assisted Review)
See Predictive Coding.
Temporary (Temp) File
Files created by applications and stored temporarily on a computer. Temp files enable increased processor speeds. In the case of temporary Internet files, for example, a browser stores website data so that the next time the same website is accessed it can be loaded directly from the temporary Internet file. Stored data may also be viewed even in the absence of an Internet connection.
A series of related communications, usually on a particular topic.
TIFF
A mild form of disagreement among opposing counsel, usually caused by bickering about forms of production. Ok, sorry for the pun. A TIFF is an image file, like a JPEG, PNG, or GIF, except that it has almost no legitimate purpose for existing. (At least one can make hilarious cat videos with GIFs!) In very backward, retrograde forms of eDiscovery, native files (see above) are converted to TIFF images and produced as such, with a load file (see above) provided to make up for the fact that the TIFF conversion process strips out almost every useful piece of information contained in the original file! Responding parties: please stop giving us TIFFs. Producing parties: don’t accept TIFFs.
Unallocated Space
Vendor
People who firmly believe that you cannot survive without them. Sometimes, but not always, they are right. If you are about to try carving and are not yourself trained in this field, please call a vendor.
VPN (Virtual Private Network)
Secure networks that utilize mechanisms, such as encryption, to ensure access by authorized users only and prevent data interception.
ZIP
Common file formatting allowing fast and simple storage for the purposes of archiving or transmitting.
Your trusted eDiscovery partner.
At IST Discover-E, we have years of experience helping our clients with their eDiscovery needs along with full scale legal support management systems. We are expert in creating and customizing eDiscovery processes that best fit our client’s needs and expectations. Our model is uniquely transparent, easy to understand and effective in aiding our clients get the decision they want for their clients.