Posted on: March 25, 2015in Blog
ESI Processing Simplified – What Every Legal Team Should Know
This post answers the following questions about ESI processing during eDiscovery: What is it? Why is it an essential step? Why does it take so long?
Recently, I summarized the eDiscovery process in three simple phases: Phase 1 - Identification, Preservation, Collection, Phase 2 - Data Analysis, Reduction, Analytics and Phase 3 - Processing, Review, Production, as well as discussed the risks that legal teams face when they choose not to follow the process.
In this post I want to focus specifically on the topic of ESI processing because of (1) the essential role it plays in eDiscovery and (2) a common lack of understanding in the legal industry of why ESI needs to be processed.
What is ESI processing?
As with most things in our industry, the definition of processing depends on with whom you are talking and their level of expertise. Let’s take a look at D4’s high-level definition:
ESI processing is an eDiscovery workflow where native ESI is ingested into a single software program (i.e. Law, iPro, Tunnelvision, Access Data FTK, EnCase, etc.) designed to extract native file metadata and textual content in a normalized, standard format.
After processing is performed, the metadata, textual content, native files and/or images are exported and repackaged into a consistent, delimited format for the eventual loading into a document review platform or database.
Why does ESI need to be processed in eDiscovery?
If ESI is not processed, the native file source applications are required to open and view all content and any visible metadata within the files. This may seem reasonable for a handful of files, but when dealing with megabytes (MBs), gigabytes (GBs) or terabytes (TBs) of ESI, working with individual native files and their source applications becomes near to impossible.
In order to authenticate ESI, electronic data should go through a repeatable and defensible process. Reviewing ESI in its original source format and native file application can lead to data corruption, spoliation issues and eDiscovery protocol challenges.
Why does processing take so long?
There are many variables that impact turnaround times and deadlines. Here are a few things that may slow down ESI processing projects:
- Total volume of ESI
- Organizational and custodian structure of ESI
- Complexity of data formats
- Proprietary data formats
- Type of document review being performed (native or image review)
- Non-standard/custom processing requirements
- Custom field requests (i.e. chron date/time fields, hidden text flags, etc.)
- Native and image file exception/error remediation
- Encryption and password protected files
- OCRing native files where textual content could not be extracted (requires imaging, which adds an additional step in the process)
- Imaging all ESI - Oftentimes, it is a wasted step until responsiveness has been determined.
- Similar to imaging all ESI, imaging in color also slows down the process and can be an unnecessary step before responsiveness has been determined (color imaging also increases data sizes and can impact review and hosting costs significantly).
Courts and opposing parties are paying close attention to how ESI is handled during the eDiscovery process. Because of this, D4 is seeing an increase in consulting engagements that revolve around the review of Discovery protocols.
In the end, legal teams can choose to take shortcuts with ESI in an attempt to expedite the process, but they do so at their own risk. In order to minimize risk, the best practice is to send all ESI—regardless of data volume—through the same repeatable and defensible process so that eDiscovery protocols don’t trump the actual issues of a case.
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted June 21, 2017
Strategic Ways to Reduce the Cost of eDiscovery
Posted June 15, 2017
Shanghai OSAC Quarterly Meeting
Posted June 15, 2017
5 Ways to Reduce eDiscovery Costs Before and During Litigation
Posted June 07, 2017
Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Posted May 31, 2017
How Does the EU-US Privacy Shield Affect Cross-Border Discovery?
Posted May 24, 2017
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law