Assessment 3 Instructions: Interdisciplinary Plan Proposal

For this assessment you will create a 2-4 page plan proposal for an interprofessional team to collaborate and work toward driving improvements in the organizational issue you identified in the second assessment.
The health care industry is always striving to improve patient outcomes and attain organizational goals. Nurses can play a critical role in achieving these goals; one way to encourage nurse participation in larger organizational efforts is to create a culture of ownership and shared responsibility (Berkow et al., 2012). Participation in interdisciplinary teams can also offer nurses opportunities to share their expertise and leadership skills, fostering a sense of ownership and collegiality.
You are encouraged to complete the Budgeting for Nurses activity before you develop the plan proposal. The activity consists of seven questions that will allow you the opportunity to check your knowledge of budgeting basics and as well as the value of financial resource management. The information gained from completing this formative will promote success with the Interdisciplinary Plan Proposal. Completing this activity also demonstrates your engagement in the course, requires just a few minutes of your time, and is not graded.
Demonstration of Proficiency

  • Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
    • Explain organizational resources, including a financial budget, needed for the plan to be a success and the impacts on those resources if nothing is done, related to the improvements sought by the plan.
  • Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
    • Describe an objective and predictions for an evidence-based interdisciplinary plan to achieve a specific objective related to improving patient or organizational outcomes.
    • Explain the collaboration needed by an interdisciplinary team to improve the likelihood of achieving the plan’s objective. Include best practices of interdisciplinary collaboration from the literature.
  • Competency 4: Explain how change management theories and leadership strategies can enable interdisciplinary teams to achieve specific organizational goals.
    • Explain a change theory and a leadership strategy, supported by relevant evidence, that are most likely to help an interdisciplinary team succeed in collaborating and implementing, or creating buy-in for, the project plan.
  • Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
    • Communicate the interdisciplinary plan with writing that is clear, logically organized, and professional, with correct grammar and spelling, using current APA style.
  • Reference
    Berkow, S., Workman, J., Aronson, S., Stewart, J., Virkstis, K., & Kahn, M. (2012). Strengthening frontline nurse investment in organizational goals. JONA: The Journal of Nursing Administration, 42(3), 165–169.
    Professional Context
    This assessment will allow you to describe a plan proposal that includes an analysis of best practices of interprofessional collaboration, change theory, leadership strategies, and organizational resources with a financial budget that can be used to solve the problem identified through the interview you conducted in the prior assessment.
    Scenario
    Having reviewed the information gleaned from your professional interview and identified the issue, you will determine and present an objective for an interdisciplinary intervention to address the issue.
    Note: You will not be expected to implement the plan during this course. However, the plan should be evidence-based and realistic within the context of the issue and your interviewee’s organization.
    Instructions
    For this assessment, use the context of the organization where you conducted your interview to develop a viable plan for an interdisciplinary team to address the issue you identified. Define a specific patient or organizational outcome or objective based on the information gathered in your interview.
    The goal of this assessment is to clearly lay out the improvement objective for your planned interdisciplinary intervention of the issue you identified. Additionally, be sure to further build on the leadership, change, and collaboration research you completed in the previous assessment. Look for specific, real-world ways in which those strategies and best practices could be applied to encourage buy-in for the plan or facilitate the implementation of the plan for the best possible outcome.
    Using the Interdisciplinary Plan Proposal Template [DOCX] will help you stay organized and concise. As you complete each section of the template, make sure you apply APA format to in-text citations for the evidence and best practices that inform your plan, as well as the reference list at the end.
    Additionally, be sure that your plan addresses the following, which corresponds to the grading criteria in the scoring guide. Please study the scoring guide carefully so you understand what is needed for a distinguished score.
  • Describe an objective and predictions for an evidence-based interdisciplinary plan to achieve a specific goal related to improving patient or organizational outcomes.
  • Explain a change theory and a leadership strategy, supported by relevant evidence, that is most likely to help an interdisciplinary team succeed in collaborating and implementing, or creating buy-in for, the project plan.
  • Explain the collaboration needed by an interdisciplinary team to improve the likelihood of achieving the plan’s objective. Include best practices of interdisciplinary collaboration from the literature.
  • Explain organizational resources, including a financial budget, needed for the plan to succeed and the impacts on those resources if the improvements described in the plan are not made.
  • Communicate the interdisciplinary plan, with writing that is clear, logically organized, and professional, with correct grammar and spelling, using current APA style.
  • Additional Requirements
  • Length of submission: Use the provided template. Remember that part of this assessment is to make the plan easy to understand and use, so it is critical that you are clear and concise. Most submissions will be 2 to 4 pages in length. Be sure to include a reference page at the end of the plan.
  • Number of references: Cite a minimum of 3 sources of scholarly or professional evidence that support your central ideas. Resources should be no more than 5 years old.
  • APA formatting: Make sure that in-text citations and reference list follow current APA style.
  • Note: Faculty may use the Writing Feedback Tool when grading this assessment. The Writing Feedback Tool is designed to provide you with guidance and resources to develop your writing based on five core skills. You will find writing feedback in the Scoring Guide for the assessment, once your work has been evaluated.
    Portfolio Prompt: Remember to save the final assessment to your ePortfolio so that you may refer to it as you complete the final Capstone course.

    PART TWO:

Assessment 4 Instructions: Stakeholder Presentation

For this assessment you will create an 8-12 slide PowerPoint presentation for one or more stakeholder or leadership groups to generate interest and buy-in for the plan proposal you developed for the third assessment.
As a current or future nurse leader, you may be called upon to present to stakeholders and leadership about projects that you have been involved in or wish to implement. The ability to communicate a plan—and potential implications of not pursuing such a plan—to stakeholders effectively can be critically important in creating awareness and buy-in, as well as building your personal and professional brand in your organization. It is equally important that you know how to create compelling presentations for others’ delivery and ensure that they convey the same content you would deliver if you were the presenter.
You are encouraged to complete the Evidence-Based Practice: Basics and Guidelines activity before you develop the presentation. This activity consists of six questions that will create the opportunity to check your understanding of the fundamentals of evidence-based practice as well as ways to identify EBP in practice. The information gained from completing this formative will help promote success in the Stakeholder Presentation and demonstrate courseroom engagement—it requires just a few minutes of your time and is not graded.
Demonstration of Proficiency

  • Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
    • Explain how the interdisciplinary plan could be implemented and how the human and financial resources would be managed.
  • Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
    • Explain an organizational or patient issue for which a collaborative interdisciplinary team approach would help achieve a specific improvement goal.
  • Competency 3: Describe ways to incorporate evidence-based practice within an interdisciplinary team.
    • Summarize an evidence-based interdisciplinary plan to address an organizational or patient issue.
  • Propose evidence-based criteria that could be used to evaluate the degree to which the project was successful in achieving the improvement goal.
    • Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
  • Communicate the PowerPoint presentation of the interdisciplinary improvement plan to stakeholders in a professional, respectful manner, with writing that is clear, logically organized, with correct grammar and spelling, using current APA style.
  • Professional Context
    This assessment will provide you with an opportunity to sharpen your ability to create a professional presentation to stakeholders. In this presentation, you will explain the Plan-Do-Study-Act cycle and how it can be used to introduce the plan (P), implement the plan (D), study the effectiveness of the plan (S), and act on what is learned (A) to drive continuous improvement. By using this cycle, the stakeholders will have a tool and a proposal to expand on these ideas to drive workplace change and create improved processes to solve an interprofessional collaboration problem.
    Scenario
    In addition to summarizing the key points of Assessments 2 and 3, you will provide stakeholders and/or leadership with an overview of project specifics as well as how success would be evaluated—you will essentially be presenting a discussion of the Plan, Do, and Study parts of the PDSA cycle. Again, you will not be expected to execute the project, so you will not have any results to study. However, by carefully examining the ways in which your plan could be carried out and evaluated, you will get some of the experience of the thinking required for PDSA.
    When creating your PowerPoint for this assessment, it is important to keep in mind the target audience: your interviewee’s organizational leadership. The overall goal of this assessment is to create a presentation that your interviewee could potentially give in his or her organization.
    Instructions
    Please follow the Capella Guidelines for Effective PowerPoint Presentations [PPTX]. If you need technical information on using PowerPoint, refer to Capella University Library: PowerPoint Presentations.
    Be sure that your plan addresses the following, which corresponds to the grading criteria in the scoring guide. Please study the scoring guide carefully so you understand what is needed for a distinguished score.
  • Explain an organizational or patient issue for which a collaborative interdisciplinary team approach would help achieve a specific improvement goal.
  • Summarize an evidence-based interdisciplinary plan to address an organizational or patient issue.
  • Explain how the interdisciplinary plan could be implemented and how the human and financial resources would be managed.
  • Propose evidence-based criteria that could be used to evaluate the degree to which the project was successful in achieving the improvement goal.
  • Communicate the PowerPoint presentation of the interdisciplinary improvement plan to stakeholders in a professional manner, with writing that is clear, logically organized, and respectful with correct grammar and spelling using current APA style.
  • There are various ways to structure your presentation; following is one example:
  • Part 1: Organizational or Patient Issue.
    • What is the issue that you are trying to solve or improve?
    • Why should the audience care about solving it?
  • Part 2: Relevance of an Interdisciplinary Team Approach.
    • Why is using an interdisciplinary team relevant, or the best approach, to addressing the issue?
    • How will it help to achieve improved outcomes or reach a goal?
  • Part 3: Interdisciplinary Plan Summary.
    • What is the objective?
    • How likely is it to work?
    • What will the interdisciplinary team do?
  • Part 4: Implementation and Resource Management.
    • How could the plan be implemented to ensure effective use of resources?
    • How could the plan be managed to ensure that resources were not wasted?
    • How does the plan justify the resource expenditure?
  • Part 5: Evaluation.
    • What would a successful outcome of the project look like?
    • What are the criteria that could be used to measure that success?
      • How could this be used to show the degree of success?
  • Again, keep in mind that your audience for this presentation is a specific group (or groups) at your interviewee’s organization and tailor your language and messaging accordingly. Remember, also, that another person will ultimately be giving the presentation. Include thorough speaker’s notes that flesh out the bullet points on each slide.
    Additional Requirements
  • Number of slides: Plan on using one or two slides for each part of your presentation as needed, so the content of your presentation will be 8–12 slides in length. Remember that slides should contain concise talking points, and you will use presenter’s notes to go into detail. Be sure to include a reference slide as the last slide of your presentation.
  • Number of references: Cite a minimum of 3 sources of scholarly or professional evidence that support your central ideas. Resources should be no more than five years old.
  • APA formatting: Make sure that in-text citations on your slides and in your notes pages and reference slide reflect current APA Style and Format.
  • Portfolio Prompt: Remember to save the final assessment to your ePortfolio so that you may refer to it as you complete the final Capstone course.

Final Quality Project

Final Quality Project

Part 3: Core Measures

The Hospital Inpatient Quality Reporting Program was originally mandated by Section 501(b) of the Medicare Prescription Drug, Improvement, and Modernization Act (MMA) of 2003. This section of the MMA authorized CMS to pay hospitals that successfully report designated quality measures a higher annual update to their payment rates. Initially, the MMA provided for a 0.4 percentage point reduction in the annual market basket (the measure of inflation in costs of goods and services used by hospitals in treating Medicare patients) update for hospitals that did not successfully report. The Deficit Reduction Act of 2005 increased that reduction to 2.0 percentage points. This was modified by the American Recovery and Reinvestment Act of 2009 and the Affordable Care Act of 2010, which provided that beginning in fiscal year (FY) 2015, the reduction would be by one-quarter of such applicable annual payment rate update if all Hospital Inpatient Quality Reporting Program requirements are not met. Under the Hospital Inpatient Quality Reporting Program, CMS collects quality data from hospitals paid under the Inpatient Prospective Payment System, with the goal of driving quality improvement through measurement and transparency by publicly displaying data to help consumers make more informed decisions about their health care. It is also intended to encourage hospitals and clinicians to improve the quality and cost of inpatient care provided to all patients. The data collected through the program are available to consumers and providers on the Hospital Compare. Data for selected measures are also used for paying a portion of hospitals based on the quality and efficiency of care, including the Hospital Value-Based Purchasing Program, Hospital-Acquired Condition Reduction Program, and Hospital Readmissions Reduction Program. Additional measures are selected with wide agreement from CMS, the hospital industry and public stakeholders like The Joint Commission (TJC), the National Quality Forum (NQF), and the Agency for Healthcare Research and Quality (AHRQ). Hospital Compare is a consumer-oriented website that provides information on how well hospitals provide recommended care to their patients. This information can help consumers make informed decisions about where to go for health care. Hospital Compare allows consumers to select multiple hospitals and directly compare performance measure information related to heart attack, heart failure, pneumonia, surgery and other conditions. These results are organized by:

• General information • Survey of patients’ experiences • Timely & effective care • Complications • Readmissions & deaths • Use of medical imaging • Payment & value of care

 

 

 

Hospital Compare was created through the efforts of Medicare and the Hospital Quality Alliance (HQA). The HQA: Improving Care Through Information was created in December 2002. The HQA was a public-private collaboration established in December 2002 to promote reporting on hospital quality of care. The HQA consisted of organizations that represented consumers, hospitals, providers, employers, accrediting organizations, and federal agencies. The HQA effort was intended to make it easier for consumers to make informed health care decisions and to support efforts to improve quality in U.S. hospitals. Since it’s inception, many new measures and topics have been displayed in the site.

• In 2005, the first set of 10 “core” process of care measures were displayed on such topics as heart attack, heart failure, pneumonia and surgical care.

• In March 2008, data from the Hospital Consumer Assessment of Healthcare Providers and

Systems (HCAHPS) survey, also known as the CAHPS Hospital Survey, was added to Hospital Compare. HCAHPS provides a standardized instrument and data collection methodology for measuring patient’s perspectives on hospital care. Also in 2008, data on hospital 30- day mortality for heart attack and heart failure was displayed. Later in 2008, mortality rates for pneumonia was added.

• In 2009, CMS added data on hospital outpatient facilities, which included outpatient

imaging efficiency data as well as emergency department and surgical process of care measures.

• 2010 saw the addition of 30-day readmission measures for heart attack, heart failure and

pneumonia patients.

• In 2011, CMS began posting data on Hospital Associated Infections (HAIs) received from the Centers for Disease Control and Preventions (CDC) National Healthcare Safety Network (NHNS). The measure sets have been expanded to include ICU’s and other hospital wards.

• In 2012, we added the CMS readmission reduction program and measures that were

voluntarily submitted by hospitals participating the American College of Surgeons National Surgical Quality Improvement Program. The three measures are:

o Lower Extremity Bypass surgical outcomes o Outcomes in Surgeries for Patients 65 Years of Age or Older o Colon Surgery Outcomes

• Hospital Compare saw the addition of the Hospital Value Based Purchasing program data in

2013. CMS continues to evolve the website, with the addition of the Overall Hospital Quality Star Rating in July 2016 and the re-introduction of measure data from Veterans Health Administration Hospitals.

 

 

After reading and following the directions, you will be provided with 10 questions. The key performance data that you will discover is readily available to the general public, your health care competitors, insurance companies and managed care organizations, and all stakeholders in your organization. Hospital administrators (e.g., CEO, CFO, COO) must be aware of this data, read it, understand it, and act on it to improve the quality of care provided in their organizations, which is necessary to best serve their communities and maintain their institution’s financial success and competitive edge. DIRECTIONS:

• Go to https://www.medicare.gov/hospitalcompare/ and read through the general information provided.

• Under the title “Hospital Compare,” type in the location Orlando, FL.

• Click on “Find Hospitals.”

• When the hospitals within this area appear, select to compare “Orlando Health Orlando

Regional Medical Center,” “AdventHealth Orlando,” and “Health Central,” then COMPARE.

• From the data displayed, locate the answers to the following 10 questions:

 

1. From the complications and death measures, which of the following three hospitals scored “Better than U.S. National Rate” on “Death Rate for COPD Patients”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

 

2. From the timely and effective care measures, which of the following three hospitals scored 90% on the process of care measure for “Healthcare Workers Given Influenza Vaccination”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

 

3. From the survey of patients’ hospital experiences, in comparing the three hospitals, what did you find was the national average for all reporting hospitals in the United States for the “percent of patients who reported that their nurses ‘always’ communicated well.”

a. 77% b. 76% c. 81% d. 78% e. 79%

 

 

 

4. From the timely and effective measures, which of the following three hospitals scored the highest on the process of care measure for percent of ““Percentage of patients who received appropriate care for severe sepsis and septic shock”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Orlando Health

 

5. From the survey of patients’ hospital experiences, which of the following three hospitals scored the lowest percentage on “Patients who reported YES, they would definitely recommend the hospital (to friends and family).”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

6. From the complications of care measures, which of the following three hospitals scored Better

than the National Benchmark for “Surgical site infections (SSI) from colon surgery”? a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

7. From the timely and effective measures, which of the following three hospitals had the lowest

percentage on the measure for percent of “Outpatients who had a follow-up mammogram, breast ultrasound, or breast MRI within the 45 days after a screening mammogram ”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

8. From the payment and value of care measures, which of the following three hospitals had

Greater than the National Average Payment on the measure for “Payment for heart attack patients”?

a. Orlando Health Orlando Regional Medical Center b. AdventHealth Orlando c. Health Central

9. From the unplanned hospital visits measures, what did you find was the national rate for all

reporting hospitals in the United States for the “Rate of readmission after discharge from hospital (hospital-wide).”

a. 15.3% b. 16.3% c. 14.3%

 

10. From the timely and effective care measures, what did you find was the rate for the state of Florida for all reporting hospitals for the “Percent of mothers whose deliveries were scheduled too early (1-2 weeks early), when a scheduled delivery was not medically necessary.”

a. 0% b. 1% c. 2%

 

Order a Similar Paper

A process recording is a written tool used by field education experience students, field instructors, and faculty to examine the dynamics of social work interactions in time.

A process recording is a written tool used by field education experience students, field instructors, and faculty to examine the dynamics of social work interactions in time. Process recordings can help in developing and refining interviewing and intervention skills. By conceptualizing and organizing ongoing activities with social work clients, you are able to clarify the purpose of interviews and interventions, identify personal and professional strengths and weaknesses, and improve self-awareness. The process recording is also a useful tool in exploring the interpersonal dynamics and values operating between you and the client system through an analysis of filtering the process used in recording a session.

For this Assignment, you will submit a process recording of your field education experiences specific to this week.

(Please see attached examples as to how assignment should be done).

Note: You are submitting a written transcript, not an audio or video recording.

The Assignment (2–4 pages) (Blank template is attached):

· Provide a transcript of what happened during your field education experience, including a dialogue of interaction with a client (students internship is an inpatient mental health hospital as a therapist. Serving clients with mental health and substance abuse).

· Explain your interpretation of what occurred in the dialogue, including social work practice theories, and explain how it might relate to diversity or cultural competence covered this week.

· Describe your reactions and/or any issues related to your interaction with a client during your field education experience.

· Explain how you applied social work practice skills when performing the activities during your process recording.

 

.

Order a Similar Paper

Information Technology and Organizational Learning

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges present in the digital era.  Will things get better or more complicated as time goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

(Information Technology and Organizational Learning)

The above submission should be one -page in length and adhere to APA formatting standards

**Remember the page length does not include the APA cover page or any references**

 

View Expert Answer 

 

Related Searches;

 

Unit VI Case Study

Unit VI Case Study

Most would agree that parenting is a lifelong job. The parent’s obligations begin once the baby is conceived and seemingly never end, even after his or her child becomes an adult.

Suppose that you are the parent in each of the following scenarios. Based on what you have learned from this unit’s materials, answer the following questions for each scenario by explaining how you would effectively handle each situation.

Note: While it is understood different people and even entire cultures have different parenting styles; your answers should be based on the research and theories presented in this unit.

Describe the stage of cognitive development of the child in each scenario. Explain how you would address the child and the situation. Will you use punishment in any of the situations? What tactics would be the most useful considering your child’s level of cognitive development?

Scenario 1: At the playground, your 5-year-old daughter shoves another child and takes away the child’s toy. Your daughter then screams at the child and runs away.

Scenario 2: You discover that your 13-year-old son has taken $20 from your purse and is planning to use it to purchase vapes (e-cigarettes) at school. The only reason you found out is because your 15-year-old daughter tattled after becoming upset that her brother would not give her half of the loot to serve as hush money. How do you address each child?

Scenario 3: Your 21-year-old daughter comes home from college and excitedly shares that she met a new guy on Tinder, and she plans to marry him next month. She then reveals that she will be quitting school, despite only having 1 year left to complete her bachelor’s degree. (She does not see the need for her degree any longer, as her fiancé́ is rich, or so she has been told.) She has decided to throw away the career plans and dream wedding she has planned since she was 10 years old because now she finally has her Prince Charming, and her life is all set!

Your combined answers for each scenario must be at least 150 words, for a minimum of 450 words for the entire assignment (not including the title and reference pages).

Your answers should include an insightful and thorough analysis and present a strong argument with evidence. You must use at least one source to support your analysis. This may be your textbook or another scholarly source. All sources used will be properly cited. Your case study, including all references, will be formatted in APA style.

 

Order a Similar Paper

 

Security Architecture and Design

Instructor: Dr. < Your Name >

Class: ISOL536-Security Architecture and Design

Assignment: Week 4 Individual Assignment 4

Length: Minimum of 600 words

Total points: 30 points

Due date: Sunday, February 2, 2020

 

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

 

 

 

 

Order a Similar Paper

Discussion  (Security Architecture and Design)

Please read instructions:

1) Discussion  (Security Architecture and Design)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

400 Words – 2 References – APA Format.

2) Assignment (Security Architecture and Design)

PFA – for assignment requirement

600 Words – 2 References – APA Format – Must include Conclusion

3) Discussion (Emerging threats and Countermeasures)

 

This chapter discusses the relevance of diversity strategy while securing any set of national assets. Diversity in national infrastructure involves the introduction of intentional differences into systems such as vendor source, deployment approach, network connectivity, targeted standards, programming language, operating system, and software version. Two systems are considered diverse if their key attributes differ, and nondiverse otherwise. The requirement for physical diversity in the design of computing infrastructure is perhaps the most familiar of all diversity-related issues. The idea is that any computing or networking asset that serves as an essential component of some critical function must include physical distribution to increase its survivability. A national diversity program should be developed that would call for coordination between companies and governmental agencies in several

Start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats.

For additional information click the link below:

https://www.resdal.org/Archivo/usa-home-prote.htm

You must do this following:

1) Create a new thread. As indicated above, discuss how the types of threats discussed in the article referenced above could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats.

TextBook:  Amoroso, E. G. (2012). Cyber-attacks: protecting national infrastructure. Elsevier. 

Let me know if you have any questions.

 

Order a Similar Paper

Data Visualisation:

Three storytelling techniques are  discussed in the text (pages 161-209) in which data is presented and  stories are being interpreted. What is the importance and the advantages  of using these techniques? Provide an example of each technique.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Note: Please write 250 words in APA format with In-text citation

 

 

Order a Similar Paper

Information Governance and Legal Functions

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.   Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.

Q1: When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases.  Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

 

Order a Similar Paper

Information Governance and Legal Functions

By Robert Smallwood with Randy Kahn, Esq. , and Barry Murphy

Information Governance and Legal Functions

C H A P T E R 8

Perhaps the key functional area that information governance (IG) impacts most islegal functions, since legal requirements are paramount. Failure to meet them can literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business manage- ment functions are important—very important—but the most signifi cant aspect of all of these functions relates to legality and regulatory compliance.

Key legal processes include electronic discovery (e-discovery) readiness and as- sociated business processes, information and record retention policies, the legal hold notifi cation (LHN) process, and legally defensible disposition practices.

Some newer technologies have become viable to assist organizations in imple- menting their IG efforts, namely, predictive coding and g technology-assisted review (TAR; also known as computer-assisted review ). In this chapter we explore the need ww for leveraging IT in IG efforts aimed at defensible disposition, the intersection be- tween IG processes and legal functions, policy implications, and some key enabling technologies.

Introduction to e-Discovery: The Revised 2006 Federal Rules of Civil Procedure Changed Everything

Since 1938, the Federal Rules of Civil Procedure (FRCP) “have governed the discovery of evidence in lawsuits and other civil cases.” 1 In law, discovery is an early y phase of civil litigation where plaintiffs and defendants investigate and exchange evidence and testimony to better understand the facts of a case and to make early determinations of the strength of arguments on either side. Each side must produce evidence requested by the opposition or show the court why it is unreasonable to pro- duce the information.

The FRCP apply to U.S. district courts, which are the trial courts of the fed- eral court system. The district courts have jurisdiction (within limits set by Congress and the Constitution) to hear nearly all categories of federal cases, including civil and criminal matters. 2

 

 

116 INFORMATION GOVERNANCE

The FRCP were amended in 2006, and some of the revisions apply specifi cally to the preservation and discovery of electronic records in the litigation process. 3 These changes were a long time coming, refl ecting the lag between the state of technology and the courts’ ability to catch up to the realities of electronically generated and stored information.

After years of applying traditional paper-based discovery rules to e-discovery, amendments to the FRCP were made to accommodate the modern practice of discov- ery of electronically stored information (ESI). ESI is any information that is created or stored in electronic format. The goal of the 2006 FRCP amendments was to recog- nize the importance of ESI and to respond to the increasingly prohibitive costs of document review and protection of privileged documents. These amendments rein- forced the importance of IG policies, processes, and controls in the handling of ESI. 4 Organizations must produce requested ESI reasonably quickly, and failure to do so, or failure to do so within the prescribed time frame, can result in sanctions. This require- ment dictates that organizations put in place IG policies and procedures to be able to produce ESI accurately and in a timely fashion. 5

All types of litigation are covered under the FRCP, and all types of e-documents— most especially e-mail—are included, which can be created, accessed, or stored in a wide variety of methods, and on a wide variety of devices beyond hard drives. The FRCP apply to ESI held on all types of storage and communications devices: thumb drives, CDs/DVDs, smartphones, tablets, personal digital assistants (PDAs), personal computers, servers, zip drives, fl oppy disks, backup tapes, and other storage media. ESI content can include information from e-mail, reports, blogs, social media posts (e.g., Twitter posts), voicemails, wikis, websites (internal and external), word processing documents, and spreadsheets, and includes the metadata associated with the content itself, which provides descriptive information. 6

Under the FRCP amendments, corporations must proactively manage the e-discovery process to avoid sanctions, unfavorable rulings, and a loss of public trust. Corporations must be prepared for early discussions on e-discovery with all depart- ments. Topics should include the form of production of ESI and the methods for pres- ervation of information. Records management and IT departments must have made available all relevant ESI for attorney review. 7

This new era of ESI preservation and production demands the need for cross- functional collaboration: records management, IT, and legal teams particularly need to work closely together. Legal teams, with assistance and input of records management staff, must identify relevant ESI, and IT teams must be mindful of preserving and pro- tecting the ESI to maintain its legal integrity and prove its authenticity.

Legal functions are the most important area of IG impact.

ESI is any information that is created or stored in electronic format.

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 117

Big Data Impact

Now throw in the Big Data effect: The average employee creates roughly one giga- byte of data annually (and growing), and data volumes are expected to increase over the next decade not 10-fold, or even 20-fold, but as much as 40 to 50 times what it is today! 8 This underscores the fact that organizations must meet legal requirements while paring down the mountain of data debris they are holding to reduce costs and potential liabilities hidden in that monstrous amount of information. There are also costs associated with dark data— unknown or useless data, such as old log fi les, that takes up space and continues to grow and needs to be cleaned up.

Some data is important and relevant, but distinctions must be made by IG policy to classify, prioritize, and schedule data for disposition and to dispose of the majority of it in a systematic, legally defensible way. If organizations do not accomplish these critical IG tasks they will be overburdened with storage and data handling costs and will be unable to meet legal obligations.

According to a recent survey, approximately 25 percent of information stored in organizations has real business value, while 5 percent must be kept as business records and about 1 percent is retained due to a litigation hold. 9 “This means that [about] 69 per- cent of information in most companies has no business, legal, or regulatory value. Companies that are able to [identify and] dispose of this debris return more profi t to sharehold- ers, can use more of their IT budgets for strategic investments, and can avoid excess expense in legal and regulatory response” (emphasis added).

If organizations are not able to draw clear distinctions between that roughly 30 percent of “high-value” business data, records, and that which is on legal hold, their IT department are tasked with the impossible job of managing all data as if it is high value. This “overmanaging” of information is a signifi cant waste of IT resources. 10

More Details on the Revised FRCP Rules

Here we present a synopsis of the key points in FRCP rules that apply to e-discovery.

FRCP 1—Scope and Purpose. This rule is simple and clear; its aim is to “secure the just, speedy, and inexpensive determination of every action.”11 Your discovery effort and responses must be executed in a timely manner.

The amended FRCP reinforce the importance of IG. Only about 25 percent of business information has real value, and 5 percent are business records.

The goal of the FRCP amendments is to recognize the importance of ESI and to respond to the increasingly prohibitive costs of document review and pro- tection of privileged documents.

 

 

118 INFORMATION GOVERNANCE

FRCP 16—Pretrial Conferences; Scheduling; Management . This rule provides guide-t lines for preparing for and managing the e-discovery process; the court expects IT and network literacy on both sides, so that pretrial conferences regarding discoverable evidence are productive.

FRCP 26—Duty to Disclose; General Provisions Governing Discovery. This rule pro- tects litigants from costly and burdensome discovery requests, given certain guidelines.

FRCP 26(a)(1)(C): Requires that you make initial disclosures no later than 14 days after the Rule 26(f) meet and confer, unless an objection or another time is set by stipulation or court order. If you have an objection, now is the time to voice it.

Rule 26(b)(2)(B): Introduced the concept of not reasonably accessible ESI. The concept of not reasonably accessible paper had not existed. This rule pro-r vides procedures for shifting the cost of accessing not reasonably accessible ESI to the requesting party.

FRCP 26(b)(5)(B): Gives courts a clear procedure for settling claims when you hand over ESI to the requesting party that you shouldn’t have.

Rule 26(f): This is the meet and confer rule. This rule requires all par- ties to meet within 99 days of the lawsuit’s fi ling and at least 21 days before a scheduled conference.

Rule 26(g): Requires an attorney to sign every e-discovery request, re- sponse, or objection.

FRCP 33—Interrogatories to Parties . This rule provides a defi nition of business e-s records that are discoverable and the right of opposing parties to request and access them.

FRCP 34—Producing Documents, Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes . In disputes overs document production, this rule outlines ways to resolve and move forward. Specifi cally, FRCP 34(b) addresses the format for requests and requires that e-records be accessible without undue diffi culty (i.e., the records must be orga- nized and identifi ed). The requesting party chooses the preferred format, which are usually native fi les (which also should contain metadata). The key point is that electronic fi les must be accessible, readable, and in a standard format.

FRCP 37—Sanctions . Rule 37(e) is known as the safe harbor rule. In principle, it s keeps the court from imposing sanctions when ESI is damaged or lost through routine, “good faith” operations, although this has proven to be a high standard to meet. This rule underscores the need for a legally defensible document man- agement program under the umbrella of clear IG policies.

The Big Data trend underscores the need for defensible deletion of data debris.

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 119

Landmark E-Discovery Case: Zubulake v. UBS Warburg

A landmark case in e-discovery arose from the opinions rendered in Zubulake v. U.B.S. Warburg , an employment discrimination case where the plaintiff, Laura Zubulake, g sought access to e-mail messages involving or naming her. Although UBS produced over 100 pages of evidence, it was shown that employees intentionally deleted some relevant e-mail messages. 12 The plaintiffs requested copies of e-mail from backup tapes, and the defendants refused to provide them, claiming it would be too expensive and burdensome to do so.

The judge ruled that U.B.S. had not taken proper care in preserving the e-mail evidence, and the judge ordered an adverse inference (assumption that the evidence was damaging) instruction against U.B.S. Ultimately, the jury awarded Zubulake over $29 million in total compensatory and punitive damages. “The court looked at the proportionality test of Rule 26(b)(2) of the Federal Rules of Civil Procedure and applied it to the electronic communication at issue. Any electronic data that is as ac- cessible as other documentation should have traditional discovery rules applied.” 13 Although Zubulake’s award was later overturned on appeal, it is clear the stakes are huge in e-discovery and preservation of ESI.

E-Discovery Techniques

Current e-discovery techniques include online review, e-mail message archive review, and cyberforensics. Any and all other methods of seeking or searching for ESI may be employed in e-discovery. Expect capabilities for searching, retrieving, and translating ESI to improve, expanding the types of ESI that are discoverable. Consider this potential when evaluating and developing ESI management practices and policies.14

E-Discovery Reference Model

The E-Discovery Reference Model is a visual planning tool created by EDRM.net to assist in identifying and clarifying the stages of the e-discovery process. Figure 8.1 is the graphic depiction with accompanying detail on the process steps.

Information Management. Getting your electronic house in order to miti- gate risk and expenses should e-discovery become an issue, from initial cre- ation of electronically stored information through its fi nal disposition

Identifi cation. Locating potential sources of ESI and determining their scope, breadth, and depth

In the landmark case Zubulake v. U.B.S. Warburg , the defendants were severelyg punished by an adverse inference for deleting key e-mails and not producing copies on backup tapes.

 

 

120 INFORMATION GOVERNANCE

Preservation. Ensuring that ESI is protected against inappropriate altera- tion or destruction

Collection. Gathering ESI for further use in the e-discovery process (pro- cessing, review, etc.)

Processing. Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review and analysis

Review. Evaluating ESI for relevance and privilege Analysis. Evaluating ESI for content and context, including key patterns,

topics, people, and discussion Production. Delivering ESI to others in appropriate forms, and using ap-

propriate delivery mechanisms

SEVEN STEPS OF THE E-DISCOVERY PROCESS

In the e-discovery process, you must perform certain functions for identifying and preserving electronically stored (ESI), and meet requirements regarding conditions such as relevancy and privilege. Typically, you follow this e-disco- very process:

1. Create and retain ESI according to an enforceable electronic records reten- tion policy and electronic records management (ERM) program. Enforce the policy, and monitor compliance with it and the ERM program.

2. Identify the relevant ESI, preserve any so it cannot be altered or destroyed, and collect all ESI for further review.

3. Process and fi lter the ESI to remove the excess and duplicates. You reduce costs by reducing the volume of ESI that moves to the next stage in the e-discovery process.

4. Review and analyze the fi ltered ESI for privilege because privileged ESI is not discoverable, unless some exception kicks in.

5. Produce the remaining ESI, after fi ltering out what’s irrelevant, duplicated, or privileged. Producing ESI in native format is common.

6. Clawback the ESI that you disclosed to the opposing party that you should have fi ltered out, but did not. Clawback is not unusual, but you have to work at getting clawback approved, and the court may deny it.

7. Present at trial if your case hasn’t settled. Judges have little to no patience with lawyers who appear before them not understanding e-discovery and the ESI of their clients or the opposing side.

Source: Linda Volonino and Ian Redpath, e -Discovery for Dummies (Hoboken, NJ: John Wiley s & Sons, 2010), http://www.dummies.com/how-to/content/ediscovery-for-dummies-cheat- sheet.html (accessed May 22, 2013). Used with permission.

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 121

Presentation. Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native and near-native forms, to elicit further infor- mation, validate existing facts or positions, or persuade an audience15

The Electronic Discovery Reference Model can assist organizations in focusing and segmenting their efforts when planning e-discovery initiatives.

Guidelines for E-Discovery Planning 1. Implement an IG program. The highest impact area to focus are your legal

processes, particularly e-discovery. From risk assessment to processes, com- munications, training, controls, and auditing, fully implement IG to improve and measure compliance capabilities.

2. Inventory your ESI. File scanning and e-mail archiving software can assist you. You also will want to observe fi les and data fl ows by doing a walk-through beginning with centralized servers in the computer room and moving out into business areas. Then, using a prepared inventory form, you should interview users to fi nd out more detail. Be sure to inventory ESI based on computer systems or applications, and diagram it out.

3. Create and implement a comprehensive records retention policy, and also include an e-mail retention policy and retention schedules for major ESI areas. This is required since all things are potentially discoverable. You must devise a comprehensive retention and disposition policy that is legally defensible.

Figure 8.1 Electronic Discovery Reference Model Source: EDRM (edrm.net)

Information Management

VOLUME RELEVANCE

Identification

Preservation

Processing

Review Production Presentation

Analysis

Electronic Discovery Reference Model/©2009/v2.0/edrm.net

Collection

The E-Discovery Reference Model is in a planning tool that presents key e-discovery process steps.

 

 

122 INFORMATION GOVERNANCE

So, for instance, if your policy is to destroy all e-mail messages that do not have a legal hold (or are expected to) after 90 days and you apply that policy uniformly, you will be able to defend the practice in court. Also, implementing the retention policy reduces your storage burden and costs while cutting the risk of liability that might be buried in obscure e-mail messages.

4. As an extension of your retention policy, implement a legal hold policy that is enforceable, auditable, and legally defensible. Be sure to include all potentially discoverable ESI XE “litigation:e-discovery”. We discuss legal holds in more depth later in this chapter, but be sure to cast a wide net when developing retention policies so that you include all relevant electronic records, such as e-mail, e-documents and scanned documents, storage discs, and backup tapes.

5. Leverage technology. Bolster your e-discovery planning and execution efforts by deploying enabling technologies, such as e-mail archiving, advanced enter- prise search, TAR, and predictive coding.

6. Develop and execute your e-discovery plan. You may want to begin from this point forward with new cases, and bear in mind that starting small and piloting is usually the best course of action.

The Intersection of IG and E-Discovery

By Barry Murphy

Effective IG programs can alleviate e-discovery headaches by reducing the amount of information to process and review, allowing legal teams to get to the facts of a case quickly and effi ciently, and can even result in better case outcomes. Table 8.1 shows the impact of IG on e-discovery, by function.

Legal Hold Process

The legal hold process is a foundational element of IG.16 The way the legal hold process is supposed to work is that a formal system of polices, processes, and controls is put in place to notify key employees of a civil lawsuit (or impending one) and the set of documents that must put on legal hold. These documents, e-mail messages, and other relevant ESI must be preserved in place and no longer edited or altered so that they may be reviewed by attorneys during the discovery phase of the litigation. But, in prac- tice, this is not always what takes place. In fact, the opposite can take place —employees can quickly edit or even delete relevant e-documents that may raise questions or even

Implementing IG, inventorying ESI, and leveraging technology to implement records retention and LHN policies are key steps in e-discovery planning.

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 123

implicate them. This is possible only if proper IG controls are not in place, monitored, enforced, and audited.

Many organizations start with Legal Hold Notifi cation (LHN) management as a very discrete IG project. LHN management is arguably the absolute minimum an orga- nization should be doing in order to meet the guidelines provided by court rules, com-g mon law, and case law precedent. It is worth noting, though, that the expectation is that organizations should connect the notifi cation process to the actual collection and preservation of information in the long term.

Table 8.1 IG Impact on E-Discovery

Impact Function

Cost reduction Reduce downstream costs of processing and review by defensibly disposing of data according to corporate retention policies

Reduce cost of collection by centralizing collection interface to save time

Keep review costs down by prioritizing documents and assigning to the right level associates (better resource utilization)

Reduce cost of review by culling information with advanced analytics

Risk management Reduce risk of sanctions by managing the process of LHN and the collection and preservation of potentially responsive information

Better litigation win rates Optimize decision making (e.g., settling cases that can’t be won) quickly with advanced analytics that prioritize hot documents

Quickly fi nd the necessary information to win cases with advanced searches and prioritized review

Strategic planning for matters based on merit

Determine the merits of a matter quickly and decide if it is a winnable case

Quickly route prioritized documents to the right reviewers via advanced analytics (e.g., clustering)

Strategic planning for matters based on cost

Quickly determine how much litigation will cost via early access to amount of potentially responsive information and prioritized review to make decisions based on the economics of the matter (e.g., settle for less than the cost of litigation)

Litigation budget optimization Minimize litigation budget by only pursuing winnable cases

Minimize litigation budget by utilizing the lowest cost resources possible while putting high-cost resource on only the necessary documents

Source: Barry Murphy, eDiscovery Journal http://ediscoveryjournal.com/l

LHN management is the absolute minimum an organization should imple- ment to meet the guidelines, rules, and precedents.

 

 

124 INFORMATION GOVERNANCE

How to Kick-Start Legal Hold Notifi cation

Implementing an LHN program attacks some of the lower-hanging fruit within an or- ganization’s overall IG position. This part of the e-discovery life cycle must not be outsourced. d Retained counsel provides input, but the mechanics of LHN are managed and owned by internal corporate resources.

In preparing for a LHN implementation project, it is important to fi rst lose the perception that LHN tools are expensive and diffi cult to deploy. It is true that some of these tools cost considerably more than others and can be complex to deploy; however, that is because the tools in question go far beyond simple LHN and reach into enter- prise systems and also handle data mapping, collection, and workfl ow processes. Other options include Web-based hosted solutions, custom-developed solutions, or process- es using tools already in the toolbox (e.g., e-mail, spreadsheets, word processing).

The most effective approach involves three basic steps:

1. Defi ne requirements. 2. Defi ne the ideal process. 3. Select the technology.

Defi ning both LHN requirements and processes should include input from key stakeholders—at a minimum—in legal, records management, and IT. Be sure to take into consideration the organization’s litigation profi le, corporate culture, and available resources as part of the requirements and process defi ning exercise. Managing steps 1 and 2 thoroughly makes tool selection easier because defi ning requirements and processes creates the confi dence of knowing exactly what the tool must accomplish.

IG and E-Discovery Readiness

Having a solid IG underpinning means that your organization will be better prepared to respond and execute key tasks when litigation and the e-discovery process proceed. Your policies will have supporting business processes, and clear lines of responsibility and accountability are drawn. The policies must be reviewed and fi ne-tuned periodically, and business processes must be streamlined and continue to aim for improvement over time.

In order for legal hold or defensible deletion (discussed in detail in the next section—disposing of unneeded data, e-documents, and reports based on set policy) projects to deliver the promised benefi t to e-discovery, it is important to avoid the very real roadblocks that exist in most organization. To get the light to turn green at the intersection of e-discovery and IG, it is critical to:

■ Establish a culture that both values information and recognizes the risks inherent in it. Every organization must evolve its culture from one of keeping everything to one of information compliance. This kind of change requires high-level ex- ecutive support. It also requires constant training of employees about how to create, classify, and store information. While this advice may seem trite, many managers in leading organizations say that without this kind of culture change, IG projects tend to be dead on arrival.

■ Create a truly cross-functional IG team. Culture change is not easy, but it can be even harder if the organization does not bring all stakeholders together when setting requirements for IG. Stakeholders include: legal; security and ethics; IT;

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 125

records management; internal audit; corporate governance; human resources; compliance; and business units and employees. That is a lot of stakeholders. In organizations that are successfully launching and executing IG projects, many have dedicated IG teams. Some of those IG teams are the next generation of records management departments, while others are newly formed. The stake- holders can be categorized into three areas: legal/risk, IT, and the business. The IG team can bring those areas together to ensure that any projects meet requirements of all stakeholders.

■ Use e-discovery as an IG proof of concept . Targeted programs like e-discovery,t compliance, and archiving have a history of return on investment (ROI) and an ability to get budget. These projects are also challenging, but more straightforward to implement and can address sub-sets of information in ear- ly phases (e.g., only those information assets that are reasonable to account for). The lessons learned from these targeted projects can then be applied to other IG initiatives.

■ Measure ROI on more than just cost savings . Yes, one of the primary benefi ts of ad-s dressing e-discovery via IG is cost reduction, but it is wise to begin measuring all e-discovery initiatives on how they impact the life cycle of legal matters. The effi ciencies gained in collecting information, for example, have benefi ts that go way beyond reduced cost; the IT time not wasted on reactive collection is more time available for innovative projects that drive revenue for companies. And a better litigation win rate will make any legal team happier.

Building on Legal Hold Programs to Launch Defensible Disposition

By Barry Murphy

Defensible deletion programs can build on legal hold programs, because legal hold management is a necessary fi rst step before defensibly deleting anything. The standard is “reasonable effort” rather than “perfection.” Third-party consultants or auditors can support the diligence and reasonableness of these efforts.

Next, prioritize what information to delete and what information the organiza- tion is capably able to delete in a defensible manner. Very few organizations are deleting information across all systems. It can be overly daunting to try to apply deletion to all en- terprise information. Choosing the most important information sources—e-mail, for example—and attacking those fi rst may make for a reasonable and tenable approach. For most organizations, e-mail is the most common information source to begin deleting. Why e-mail? It is fairly easy for companies to put systematic rules on e-mail because the technology is already available to manage e-mail in a sophisticated manner. Because e-mail is such a critical data system, e-mail providers and e-mail archiving providers early on provided for systematic deletion or application of retention rules. However, in

IG serves as the underpinning for effi cient e-discovery processes.

 

 

126 INFORMATION GOVERNANCE

non–e-mail systems, the retention and deletion features are less sophisticated; there- fore, organizations do not systematically delete across all systems.

Once e-mail is under control, the organization can begin to apply lessons learned to other information sources and eventually have better IG policies and processes that treat information consistently based on content rather than on the repository.

Destructive Retention of E-mail

A destructive retention program is an approach to e-mail archiving where e-mail messages are retained for a limited time (say, 90 days), followed by the permanent manual or automatic deletion of the messages from the organization network, so long as there is no litigation hold or the e-mail has not been declared a record.

E-mail retention periods can vary from 90 days to as long as seven years:

■ Osterman Research reports that “nearly one-quarter of companies delete e- mail after 90 days.” 17

■ Heavily regulated industries, including energy, technology, communications, and real estate, favor archiving for one year or more, according to Fulbright and Jaworski research.

■ The most common e-mail retention period traditionally has been seven years; however, some organizations are taking a hard-line approach and stating that e-mails will be kept for only 90 days or six months, unless it is declared as a record, classifi ed, and identifi ed with a classifi cation/retention category and tagged or moved to a repository where the integrity of the record is protected (i.e., the record cannot be altered and an audit trail on the history of the re- cord’s usage is maintained).

Newer Technologies That Can Assist in E-Discovery

Few newer technologies are viable for speeding the document review process and im- proving the ability to be responsive to court-mandated requests. Here we introduce pre- dictive coding and technology-assisted review (also known as computer-assisted review), the most signifi cant of new technology developments that can assist in e-discovery.

For most organizations, e-mail is the most common information source to begin deleting according to established retention policies.

Destructive retention of e-mail is a method whereby e-mail messages are re- tained for a limited period and then destroyed.

 

 

INFORMATION GOVERNANCE AND LEGAL FUNCTIONS 127

Predictive Coding

During the early case assessment (ECA) phase of e-discovery, t predictive coding is ag “court-endorsed process” 18 utilized to perform document review. It uses human exper- tise and IT to facilitate analysis and sorting of documents. Predictive coding software leverages human analysis when experts review a subset of documents to “teach” the software what to look for, so it can apply this logic to the full set of documents, 19 mak- ing the sorting and culling process faster and more accurate than solely using human review or automated review.

Predictive coding uses a blend of several technologies that work in concert:20 soft- ware that performs machine learning (a type of g artifi cial intelligence software that “learns” and improves its accuracy, fostered by guidance from human input and pro- gressive ingestion of data sets—in this case documents); 21 workfl ow software, which w routes the documents through a series of work steps to be processed; and text analyt- ics software, used to perform functions such as searching for keywords (e.g., “asbestos” in a case involving asbestos exposure). Then using keyword search capabilities, or con- cepts using s pattern search or meaning-based search, and sifting through and sorting documents into basic groups using fi ltering technologies, based on document content,g and sampling a portion of documents to fi nd patterns and to review the accuracy of g fi ltering and keyword search functions.

The goal of using predictive coding technology is to reduce the total group of documents a legal team needs to review manually (viewing and analyzing them one by one) by fi nding that gross set of documents that is most likely to be relevant or responsive (in legalese) to the case at hand. It does this by automating, speeding up, and improving the accuracy of the document review process to locate and “digitally categorize” documents that are responsive to a discovery request. 22 Predictive coding, when deployed properly, also reduces billable attorney and paralegal time and there- fore the costs of ECA. Faster and more accurate completion of ECA can provide valu- able time for legal teams to develop insights and strategies, improving their odds for success. Skeptics claim that the technology is not yet mature enough to render more accurate results than human review.

The fi rst state court ruling allowing the use of predictive coding technology in- stead of human review to cull through approximately 2 million documents to “execute a fi rst-pass review” was made in April 2012 by a Virginia state judge.23 This was the fi rst time a judge was asked to grant permission without the two opposing sides fi rst coming to an agreement. The case, Global Aerospace, Inc., et al. v. Landow Aviation, LP, et al., stemmed from an accident at Dulles Jet Center.

In an exhaustive 156-page memorandum, which included dozens of pages of legal analysis, the defendants made their case for the reliability, cost- effectiveness, and legal merits of predictive coding. At the core of the memo

Predictive coding software leverages human analysis when experts review a subset of documents to “teach” the software what to look for, so it can apply this logic to the full set of documents.

 

Order a Similar Paper