Anti-Fraud Analytics and Electronic Discovery

advertisement
Anti-Fraud Analytics and
Electronic Discovery:
Bridging the gap between Legal, IT and Audit
IIA and ISACA Orange County Chapters
March 11, 2013
Matthew L. Miller, Esq.
Fraud – An Expensive Issue
Barclays was fined £290m by for its role in the Libor fixing scandal
(The Guardian, August 29, 2012)
GlaxoSmithKline to pay $3 Billion in fines for criminal and civil
violations involving 10 drugs
(NY Daily News, July 3, 2012)
US Expands Probe Of Lilly's Compliance With Anti-bribery Law
(The Wall Street Journal, February 23,2010)
Alcatel to Pay $137 Million to Avoid US Prosecution
(Business Week, February 18, 2010)
Stanford convicted and sent to jail for $7 Billion fraud case
(Boston Globe, June 29, 2009)
Halliburton to Pay $559 Million To Settle Bribery Investigation
(The Wall Street Journal, January 27, 2009)
Bribery Case Will Cost Siemens $1.6 Billion
(The New York Times, December 16, 2008)
Page 2
IIA / ISACA Orange County Chapters
Current environment
The perfect storm for fraud & business corruption
Companies are
downsizing and
decentralized
which has an
immediate effect
on internal
controls
Page 3
Internal and External
Pressure
Large
construction and
vendor project
relationships
Stressed and
disaffected
employees may
have greater
ability to
rationalize
improper actions
Opportunity to
Commit Fraud
Market levels
remain low
Regulatory focus
increased at
State and Federal
level
Budgets are
decreasing.
Companies and
organizations are
doing more with
less.
Opportunity
Internal
Controls
Pressure
Rationalization
IIA / ISACA Orange County Chapters
The Fraud Tree – Risk areas
Asset Misappropriation
►
►
►
►
►
►
►
►
►
►
►
Corruption / FCPA
Cash Disbursements
►
Cash Larceny
►
Fake Vendors
►
General Ledger
►
Materials Management &
►
Inventory Control
►
Purchase Order
►
Management
►
Salaries & Payroll Fraud
►
Theft of Assets – Inventory/ ►
Accounts Receivable / Fixed
►
Assets
Travel & Expenses Fraud ►
►
Vendor Management
Payment Cards
Page 4
Bid-Rigging
Bribery
Charity Payments
Conflicts of Interest
Contract Compliance
Customs Payments
Gifts & Entertainment
Government Customers
Illegal Gratuities
Kickbacks
Payments to Agents
Petty Cash
Procurement Rigging
IIA / ISACA Orange County Chapters
Financial Misstatement
►
►
►
►
►
►
►
►
►
Accounts Payable
Account Receivable
Deposits
GAAP
General Ledger
Non-financial
Reserves Analysis
Revenue Recognition
Sales Analysis
What is impact for the three types of Fraud
Types of Fraud
Category
Description
Examples
% of all
cases*
Average
Loss
Asset
Misappropriation
Schemes in which the
perpetrator steals or misuses
an organization’s resources.
►
Fraudulent invoicing
► Payroll fraud
► Skimming cash receipts
►Forging company checks
86.7%
$120,000
Corruption
Schemes involve the
employee’s use of their
influence in a way that violates
his or her duty to the employer
for themselves or someone
else.
►
Accepting or paying a
bribe
►Extortion
►Undisclosed
conflict of interest
33.4%
$250,000
Fraudulent
Statement Fraud
Schemes involving the
intentional misstatement or
omission of material information
in the financial reports.
►
Booking fictitious sales
► Recording expenses in
the wrong period
► Concealing liabilities
7.6%
$1,000,000
Source: ACFE Report to the Nation 2012
*sum of %s in this chart exceeds 100% because several cases involved schemes from more than one category
Page 5
IIA / ISACA Orange County Chapters
http://www.transparency.org/cpi2012/results
Page 6
IIA / ISACA Orange County Chapters
Components of an effective anti-fraud and
compliance program
Assess
Improve
Codeof
Ethics
Corruption&
Fraud
Prevention
Policies
Proactive
Communication
and
Training
Reactive
Analytics/
Controls/
Monitoring
Risk
Assessment
Monitor
SettingtheProperTone
Incident
Response
Plan
Communicate
Action
Action
Action
Action
Action
Action
Action
Develop
Adetailed
Anti-corruptionwork
program
Raise
awarenessand
understandingof
corruptionrisksand
laws
Conduct
aCorruptionrisk
assessment
ContinuousMonitor
effectivenessof
Corruptioncontrols
throughanalytics
Review resultsand
developaction
plantoaddress
FCPA/corruption
issues
Respond
toincidentsand
allegationsofbribery
andcorruption
Communicate
ToStakeholders
Page 7
IIA / ISACA Orange County Chapters
How is fraud detected?
50.3 % by
tip or
accident!
*ACFE 2008 Report to the Nation On Occupational Fraud
Source: ACFE Report to the Nation 2012
Page 8
IIA / ISACA Orange County Chapters
Who is reporting fraud?
*ACFE 2008 Report to the Nation On Occupational Fraud
Source: ACFE Report to the Nation 2012
Page 9
IIA / ISACA Orange County Chapters
Page 10
IIA / ISACA Orange County Chapters
Is your sample seeing the picture?
Page 11
IIA / ISACA Orange County Chapters
Data sources – Selected examples
►
Unstructured Data
►
►
►
►
►
►
►
Email
Instant Messages
Text/Mobile Device Messages
Phone Records
Social Media
Trade Press and Commentary
Structured Data
►
►
►
►
►
►
►
Page 12
Financial Records
T&E
Claims Data
Purchase Orders
Inventory Records
Employee and Vendor Lists
Public Databases
IIA / ISACA Orange County Chapters
Data Mining: Techniques
►
Unstructured
►
►
►
►
►
►
►
►
Structured Data
►
►
►
►
►
Emotive Tone Analysis
Document Classification
Topic Modeling
Concept Induction
Fact Pattern Analysis
Social Network and Actor Analysis
Predictive Modeling
Fraud Scenario Tests
Temporal Analysis
Anomaly Detection
Cluster Analysis
Integrated
►
►
►
Page 13
Predictive Modeling
Transaction Analytics
Behavior Modeling
IIA / ISACA Orange County Chapters
Forensic analytics maturity model
Beyond traditional “rules-based queries” – consider all four quadrants
Unstructured
Data
Structured
Data
Low
High
Matching, Grouping, Ordering,
Joining, Filtering
Anomaly Detection, Clustering
Risk Ranking
“Traditional” rules-Based Queries & Analytics
Statistical-Based Analysis
Data visualization, Drill-down
into data, Text Mining
Keyword Search
Traditional Keyword Searching
High
Page 14
Detection Rate
Data Visualization & Text Mining
False Positive Rate
IIA / ISACA Orange County Chapters
Low
Finding hidden money…
Duplicative / split payment analysis
Different
Vendor ID
Similar names
Page 15
Same
Date
Exact
Same
Amount
Different
Invoice #
Some with same
address
IIA / ISACA Orange County Chapters
Same Reference /
Job Code
Vendor / employee conflicts of interest
Vendor Master and Employee Master should not overlap.
Analysis of phone numbers and fuzzy address matches.
Page 16
IIA / ISACA Orange County Chapters
Transaction Risk Scoring
Review breaches on
targeted analytics
Page 17
IIA / ISACA Orange County Chapters
Filter by selected
analytics
Apply various “weightings” to each test
Based on case specific relevance (e.g., scale of 1 to 3 importance)
Adjust weightings for
analytics per
relevance criterion
Page 18
IIA / ISACA Orange County Chapters
Who calls it “bribe expense?”
Page 19
IIA / ISACA Orange County Chapters
Keyword Search Summary
Analyze Keyword Hits by Term, Custodian and Date
Analyze effectiveness of keywords. Understand the effect of keyword hits by
custodian and timeframe to prioritize review and analyze keyword hits.
Page 20
IIA / ISACA Orange County Chapters
Text Mining: “Disbursements Analysis”
Page 21
IIA / ISACA Orange County Chapters
Anti-Bribery & Corruption Analytics
Who said what, where and how much?
Page 22
IIA / ISACA Orange County Chapters
Travel & entertainment
“Who entertained whom, where, what for and for how much?”
Page 23
IIA / ISACA Orange County Chapters
Communication Analytics
“Who emailed whom, when, what and why?”
WHO
`
WHAT
WHEN
WHY
SocialN etw orking
Concept Clustering
Com m unication O ver Tim e
Sentim ent A nalysis
W ho is talking to w hom ?
about what?
over which time period?
how do they feel?
• People-to-people analysis
• Top words mentioned
• When communications occur
• Positive vs. Negative Sentiment
• Entity-to-entity analysis
• Key concepts / topics
• Top 10 negative journal entries
• Map communication lines
to organization chart
• Top or unusual dollar amounts
• Communication spikes
around key business events
• Sensitive words / phrases
• Top 10 angry emails
• Top 10 most concerned emails
• Customer survey analysis
• Employee survey analysis
Page 24
IIA / ISACA Orange County Chapters
New Research: Fraud Triangle Analytics
Page 25
IIA / ISACA Orange County Chapters
The Fraud Triangle*
Applying theory to electronic communications
* Donald R. Cressey's “Fraud Triangle” ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists. 1.nald R. Cressey's “Fraud Triangle”
; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists.
Page 26
IIA / ISACA Orange County Chapters
EY / ACFE library of ‘keywords’
(Over 3,000 terms in a over a dozen languages so far…)
Rationalization
Incentive/ Pressure
Opportunity
…I deserve it
…make the number
…special fees
…nobody will find out
…don’t let the auditor find out
…client side storage
…gray area
…don’t leave a trail
…off the books
…they owe it to me
…not comfortable
…cash advance
…everybody does it
…why are we doing this
…side commission
…fix it later
…pull out all the stops
…backdate
…the company can afford it
…do not volunteer information
…no inspection
…not hurting anyone
…want no part of this
…no receipt
…won’t miss it
…only a timing difference
…smooth earnings
…don’t get paid enough
…not ethical
…pull earnings forward
Page 27
IIA / ISACA Orange County Chapters
Fraud Triangle analytics – Calculation
Joint EY and ACFE Research Project
Page 28
IIA / ISACA Orange County Chapters
Fraud Triangle Analytics – Research
Bribery Case
Keyword hits as a percentage of total emails
Incentive/Pressure Terms
Opportunity Terms
Rationalization Terms
Investigation timeframe, September 2006 to March 2007
Page 29
IIA / ISACA Orange County Chapters
Interactive dashboard
Fraud Triangle Analytics – Interactive Dashboard
Page 30
IIA / ISACA Orange County Chapters
Electronic Discovery
“eDiscovery”
Page 31
IIA / ISACA Orange County Chapters
Electronic Discovery
“eDiscovery” - FACTS
►Fact: Average number of connected devices per
knowledge worker is expected to reach 3.3 by 2014. This
is up from an average of 2.8 in 2012
►Fact: The deadly cost of ignoring big data: $71.2 Million
in lost revenue per year
►Fact: Through 2013, more than 60% of enterprises will
have some form of Cloud adoption, and the majority will
be exploring Cloud techniques
►Fact: Total eDiscovery costs per gigabyte reviewed are
generally around $18,000
Page 32
IIA / ISACA Orange County Chapters
Top Ten Reasons You Need to Know More
About eDiscovery
10: Your organization has an eDiscovery project budgeted for 2013/2014.
9: You are tasked with developing a business case to justify an eDiscovery project for
2013/2014.
8: Your organization does not have an established eDiscovery Team.
7: Your organization does not have email archiving or is looking to buy a system.
6: Your organization is currently going through a Merger/Acquisition/Divesture.
5: Your organization is saving all their backup and recovery tapes forever to address
litigation issues
4: Your organization has recently issued a legal hold, but is not adequately enforcing
the hold .
3: Your organization has in-house eDiscovery related software, but has technology
gaps or uses outside 3rd-party vendors and/or manual data collection methods
2: Your organization has more than 10 major cases per year, and/or has a wide
dispersed network with thousands of potential custodians.
1: Your organization has made the front page of the Wall Street Journal and not
in a good light.
Page 33
IIA / ISACA Orange County Chapters
Why Do Corporations Care About eDiscovery?
Why does the Legal department care? On average, “American businesses are
spending between $2.5 and $4.0 million
per year for e-Discovery, per billion
-Wants to defend the corporation
dollars in sales… making e-discovery the
-Avoiding Sanctions
largest controlled cost in American
-Mitigating Risk
business.1”
-Minimizing Costs
-CFO pressure
-Wants fewer lawyers doing review saving time and money
Why does the IT department care?
1 Source:
Cohasset Associates. “The Eternal Charter: Improving
Corporate Governance through Compliance and Assured Records
Management.” June 2005.
-It’s their network, hands off!
-Time
-Resources
-They will end up doing the work operationally
Page 34
IIA / ISACA Orange County Chapters
eDiscovery - What Every IT/Audit/Compliance/Legal
Professional Should Know
►
►
Why do the Courts care about Electronically Stored Information (ESI)?
More than 95 percent of all information is now electronic:
•
•
•
•
ESI is normally stored in much greater volume than are hard copy documents.
ESI is dynamic, in many cases modified simply by turning a computer on and off.
ESI can be incomprehensible when separated from the systems that created it.
ESI contains non-apparent information, or metadata, that describes the context of
the information and provides other useful and important information.
►
IT professionals need to understand the Rules of Evidence and Rules of Civil
Procedure as much as they do the server technology and storage area
networks
►
Lawyers, on the other hand, need to understand how IT professionals
manage their business and at a high level, what is on the network and where.
►
The confluence of IT and Law has subsumed litigation in the U.S.
Page 35
IIA / ISACA Orange County Chapters
ESI Sources – Going Beyond Email
80%
Email (and attachments)
60%
General office productivity documents
49%
Database records
41%
Invoices and other customer records
36%
Financial statements
Laptops
29%
Phone call recordings & other audio files
Desktops
25%
Digital images
File Server
21%
Instant messages
Email Server
16%
Video files
5%
Other
0%
10% 20% 30% 40% 50% 60% 70% 80% 90%
IIA / ISACA
Orange
County
Chapters
Page 36Source: ESG Research Report, Electronic Discovery Requirements
Escalate,
November,
2007
How much potentially relevant data do you
have on your network?
►
►
►
►
►
CD = 650 MB = 50,000 pages. DVD = 4.7 GB = 350,000 pages. DLT Tape = 40/80 GB = 3 to 6 Million pages.
Super DLT Tape = 60/120 GB = 4 to 9 Million pages.
***************************
Page Estimates:
1 MB is about 75 pages;
1 GB is about 75,000 pages (pick-up truck full of documents).
Aver. pgs. per email: 1.5 (100,099 pages per GB).
Aver. pgs. per word document: 8 (64,782 pages per GB).
Aver. pgs. per spreadsheet: 50 (165,791 pages per GB).
Aver. pgs. per power point: 14 (17,552 pages per GB).
***************************
For the average .PST or .NSF Email File:
100 MB .PST file is 900 emails and 300 attachments.
400 MB .PST file is 3,500 emails and 1,200 attachments.
600 MB .PST file is 5,500 emails and 1,600 attachments.
A 1.00 GB .NSF file is 9,000 emails and 3,000 attachments.
A 1.5 GB .NSF file is 13,500 emails and 4,500 attachments.
***************************
Note: Many variables will affect ALL of the actual numbers above, including especially large image and video files, and recursive
files.
►
***************************
Bits and Bytes Sizes:
•8 bits are equal to 1 byte (one or two words),
•1,024 bytes are equal to 1 kilobyte (KB).
•1,024 kilobytes (KB) are equal to 1 megabyte (MB or Meg).
•1,024 megabytes are equal to 1 gigabyte (GB or Gig) (truck full of paper).
•1,024 gigabytes are equal to 1 terabyte (TB) (50,000 trees of paper).
*ACFE 2008
the
Nation
On Occupational
Fraud
•1,024Report
terabytestoare
equal
to 1 petabyte
(PB) (250 Billion
Pgs. of Text).
•1,024 petabytes are equal to 1 exabytes (EB) (1 000 000 000 000 000 000 bytes).
Page 37
IIA / ISACA Orange County Chapters
New Court Rules for eDiscovery
►
Federal Rules of
Civil Procedure
►
►
►
►
Went into effect:
December 1, 2006
►
Requires meetings to discuss
e-discovery
Requires production of all potentially
relevant reasonably accessible data
Defines "electronically stored information"
Deals with inadvertent waivers
of privilege
Enables requesting party, in first instance,
to specify desired production formats
Sets up possible "safe harbor"
for lost data
*ACFE 2008 Report to the Nation On Occupational Fraud
Page 38
IIA / ISACA Orange County Chapters
What are the eDiscovery requirements
from the FRCP?
►
Rule 16 – Court orders regarding electronic discovery much earlier
►
Rule 26 – Early discussions and disclosures of electronic information.
Pre-meeting must occur between teams at companies involved in a lawsuit.
Companies must represent where and how data is stored. Technology must
be in place to provide access to requested information
►
Rule 33 – Responding to interrogatories by providing access to systems
►
Rule 34 – Electronically stored information (ESI) gets its own category.
Organizations must deliver files & emails in the format requestors define.
Formats are usually native to retain hidden metadata (which must be
extracted). This rule precludes most search solutions that convert or do not
extract metadata
►
Rule 37 – Sanctions and good faith. Codifies legal hold standards to
ensure automated systems don’t delete evidence. Companies cannot delete
files or emails involved in an ongoing lawsuit. Precludes search solutions that
don’t include data classification or management
Page 39
IIA / ISACA Orange County Chapters
What are the eDiscovery requirements from the FRCP?
►
eDiscovery
►
►
►
FRCP Rule change — Specifically address eDiscovery; add references to
electronically stored information (ESI); codified principles set forth in Zubulake
►
►
►
Electronic Discovery - is the compiling, storing and securing of digital electronically stored
information, such as e-mail, files and other data.
Electronically Stored Information (ESI) – is a digital file, document, email or record that was
originally created on a computer or a paper document that has been scanned.
Defensible Process. The amendments underscore the importance of a systemized
eDiscovery processes. Organizations need to establish a repeatable and defensible
eDiscovery process.
The Duty to Preserve ESI Applies Only to Relevant Data. The Advisory Committee Notes
provide that preservation efforts need only be “reasonable” and “narrowly tailored” to relevant
information.
Early Attention Requirement. Rules 16(b) and 26(f) require a pre-trial conference,
“Meet and Confer”, about eDiscovery.
► Rule 34(b) Production Requirement. Rule 34(b) permits the requesting party
*ACFE
2008 Report
to the
On Occupational
Fraud
specify
the form
ofNation
production;
however,
absent specification, “must produce
information in a form in which it is ordinarily maintained.”
Page 40
IIA / ISACA Orange County Chapters
to
eDiscovery - What Every IT/Audit/Compliance/Legal
Professional Should Know
►
Generally after a lawsuit and before the trial there is a period of time referred
to as Discovery where each party asks questions about the claims and
defenses to avoid surprises at trial.
►
Evidence collected during Discovery is used to prove or disprove claims.
►
If a party withholds information (evidence), it may be penalized by
sanctions, adverse inferences, and losing the trial
►
There are four primary categories of Discovery:
1.
2.
3.
4.
Page 41
Written questions referred to as interrogatories;
Requests for the production of documents and things;
Requests for admissions; and
Oral testimony called depositions.
IIA / ISACA Orange County Chapters
eDiscovery - What Every IT/Audit/Compliance/Legal
Professional Should Know
►
Interrogatories are questions: ex., "Describe the procedures for daily backup
of the e-mail system” , “List all employees who had passwords to the Oracle
Financial database between Jan. 20, 2003 and May 9, 2005”
►
Document: ex., “All .doc, .xls and .ppt with any of these 50 keywords”; “All emails from certain individuals during a defined time period”, “all reports from
a certain financial system”, or “copies of correspondence between specific
individuals or departments”.
•
►
For purposes of this notice, “Electronically Stored Information” shall include, but not be limited to, all text files (including word processing
documents), spread sheets, email files and information concerning email (including logs of email history and usage, header information
and “deleted” files), Internet history files and preferences, graphical image files (including “.JPG, .GIF, .BMP and TIFF” files), data bases,
calendar and scheduling information, computer system activity logs, and all file fragments and backup files containing ESI.
Request for admissions are a series of questions to admit true or deny. For
instance, "Admit or deny that all e-mails sent by Jane Doe were not saved
between June 27, 2001 and Sept. 10, 2003”
Depositions Under the discovery rules, IT professional can be deposed by a
category of "the person or persons most knowledgeable" about lists of things
like e-mail, backups, databases, Web sites related to the lawsuit, and the
*ACFE 2008 Report to the Nation On Occupational Fraud
like.
►
Page 42
IIA / ISACA Orange County Chapters
eDiscovery for Compliance Enforcement/Audit
►
eRecords Management Auditing - Conduct proactive records
management audits to identify all records that are in violation of your
policy, if documents match the search criteria, they should be
preserved as evidence for later use.
►
Need the ability to search, collect any file types or combination of
search terms for collection of electronic evidence
►
Need the ability to reveal confidential documents anywhere on
your network and collect it for evidentiary purposes.
►
Protect your company's Intellectual Property and assist with
maintaining accurate financials
Page 43
IIA / ISACA Orange County Chapters
Electronic Discovery Reference Model
www.edrm.net
*ACFE 2008Information
Report to the Nation
On Occupational Fraud
Technology
Page 44
IIA / ISACA Orange County Chapters
Legal
Enterprise-wide eDiscovery Technology
Reduce Cost and Risk across the EDRM
Electronic Discovery Reference Model
(www.edrm.net)
Current
Scope
Processing
Preservation
Information
Management
Identification
Review
Production
Presentation
Collection
Analysis
VOLUME
Identification – Data Mapping,
Early Case Assessment
• Metadata Scan
• Custodian, File Type,
Date Range, Keyword
• Volume of Expected ESI
Collection
• Location for Data
Mapping
• Sampling
• Keyword
Page 45 Testing
RELEVANCE
Search, Collection & Forensic
Preservation
Processing
•
•
•
•
•
•
•
•
By Custodian / SID
By Operator
By File Type
By Keyword, Boolean, Proximity,
Date Range, Pattern, Hash Value
• By Metadata
• By Location, range of IP
• In any language
Deduplication
Privilege Forking
Review Grouping
Further Culling &
Filtering when
scope is narrowed
• Chain of Custody
and Authenticity
IIA / ISACA Orange County•Chapters
Load Files or Native
Review & Analysis
• Responsiveness
• Privilege
Determination
• Confidential
• Hot Docs
• Concept Grouping
• Near-duplicates
• Quality Control
The eDiscovery Funnel
Page 46
IIA / ISACA Orange County Chapters
Solidifying Your eDiscovery Readiness
Your eDiscovery Program must:
Your eDiscovery Team must:
•
Mitigate Risks
•
Communicate
•
Reduce Costs
•
Delegate
•
and help you Gain Control over
eDiscovery and ESI.
•
and Maintain Control over
eDiscovery and ESI.
Primary Technology Solutions
• eDiscovery
• Data Classification
• Incident Response
• Forensics
• Archiving/Storage
Page 47
Other Related Technologies
• Policy & Configuration Management
• Data Loss Prevention
• Encryption and Key Management
• eMail Security
IIA / ISACA Orange County Chapters
Establish an eDiscovery/Compliance Team
►
“Successful CIOs should enhance their relationships with
internal legal and corporate-affairs teams and be prepared
to engage productively with regulators. They will need to
seek solutions that meet government mandates at
manageable cost and with minimal disruption.”
- McKinsey Quarterly, February 2009
►
Who better than the IT folks to know where ESI is?
The team should be composed of both Legal and IT
Large and small companies alike are assembling teams to lower cost
and risk
In order to make sure that everyone’s on the same page, need a
dedicated Legal person to deal with IT, and a dedicated IT person to
*ACFE 2008 Report to the Nation On Occupational Fraud
deal
with Legal (or a liaison)
►
►
►
Page 48
IIA / ISACA Orange County Chapters
Establish an eDiscovery/Compliance Team
Drivers for Working Together
► eDiscovery and civil litigation
►
►
►
►
Compliance and regulatory issues
►
►
►
►
►
►
FRCP
Recent Case law
International trends
Sarbanes-Oxley whistleblower hotlines, accounting systems, etc.
HIPAA and policing health information
PCI requirements need to be met for credit card numbers and information
SEC and banking-regulated companies and all that they need to deal with
FDA requires many pharmaceutical systems be “validated”
Internal investigations
Fraud
► Policy violations
► Firing
► Internal audit
*ACFE 2008 Report to the Nation On Occupational Fraud
►
Page 49
IIA / ISACA Orange County Chapters
Translate to each others language
Legal Help IT Understand eDiscovery
► In-house legal teams should meet with IT (if they aren’t already) to help them
better understand the nature of eDiscovery, particularly the “upstream” parts
of the process (specifically, identification, preservation, and collection) which
IT tends to be responsible for
► With an understanding of the nature of eDiscovery, IT can improve its ability
find the right documents, avoiding over-collection and reducing
“downstream” processing costs.
► In addition, new eDiscovery technologies are making it increasingly easy for
legal to own more of the process, reducing the eDiscovery burden on IT
IT Help Legal Understand IT Reality
► Conversely, IT should provide advice and mentoring as legal seeks to bring
eDiscovery platforms in-house
► For legal teams, bringing eDiscovery in-house may seem daunting, but
enterprise software has been around for a long time, and learning from IT’s
experiences can make the process far less intimidating
► What is an achievable deadline for collection and production?
Page 50
IIA / ISACA Orange County Chapters
The Committee of Decision-Makers
Corporate Legal Department
Corporate Litigation Support Department
Internal Audit Department
Information Risk Department
Compliance Department
IT Department
► CIO
► CISO (may run the project from IT side)
► Corporate Security Manager
► Networks
► Desktops
► Email
► Servers
► Archive
► Back-Up
Page 51
IIA / ISACA Orange County Chapters
Establish an eDiscovery/Compliance Team
eDiscovery/Compliance Teams In Action
► Focus on searching for and collecting ESI
► Enforce records management and compliance policies
► Police the data that’s out there – determining when it
should be deleted or when it should be moved to storage,
etc.
► Help companies minimize cost and also minimize risk
► Have increased consistency in terms of how they search
because they’re an internal team that does it all the time
► As such, they improve the quality of that search and
collection, as well as increasing its responsiveness
Page 52
IIA / ISACA Orange County Chapters
Establish an eDiscovery/Compliance Team
eDiscovery/Compliance Team Responsibilities
►
Orchestrating the relationship between IT and Legal
►
Overseeing eDiscovery, Compliance, Risk, Audit, & Cyber Security
►
Ensuring third-party vendor compliance
►
Developing strategies and tactics to manage risk
►
Establishing privacy policies to advise organization on how data will be
protected, identified, preserved, collected, processed and reviewed
►
Creating a response plan in the event of a security breach
*ACFE 2008 Report to the Nation On Occupational Fraud
Page 53
IIA / ISACA Orange County Chapters
Establish an eDiscovery/Compliance Team
eDiscovery/Compliance Teams are being created across
the board
►
There’s a perception that smaller companies aren’t doing
this, but that’s not the case.
►
A lot of small companies are heavily regulated, and if
they’re outsourcing e-discovery, that can be very, very
expensive.
►
Many companies are seeing huge savings by bringing
this in house and controlling it.
Page 54
IIA / ISACA Orange County Chapters
eDiscovery/Compliance Team:
Summary
►
►
►
►
►
Don't wait for a security issue to introduce your IT and your legal
departments. Be highly proactive.
Use eDiscovery to get a jump on information security issues.
Consider hiring an Electronically Stored Information (ESI)
Coordinator to help you bridge IT and Legal, as now recommended
by a number of judicial districts.
Consider enlisting outside, objective experts to handle tasks such as
conducting a security assessment, preparing a crisis communications
plan and reviewing the customer notification requirements. Their
input will help you respond quickly to any breaches, and will help
prove you did your best to provide reasonable and prudent
safeguards.
Don't get caught up in security theater, i.e., countermeasures that
provide the feeling of security while doing little or nothing to actually
improve it. For example, what we are doing today is good enough…
(it could be better!)
Page 55
IIA / ISACA Orange County Chapters
Legal Hold Business Challenges
► “The basic principle that an organization has a duty to preserve relevant
information in anticipation of litigation is easy to articulate. However, the precise
application of that duty can be elusive.”
►The Sedona Conference® Commentary on Legal Holds: The Trigger & The
Process, August 2007
► Many current litigation hold solutions do not provide an integrated means to
systematically collect & process data from custodians subject to litigation holds
► Ensuring that the legal hold is enforced
► Keeping custodians out of the mix
► “Collect to Preserve” vs “Preserve in Place”
Page 56
IIA / ISACA Orange County Chapters
Duty to Preserve - Legal Hold Notification
►Duty to Preserve
► Begins when counsel for a party reasonably anticipates litigation, i.e., knows or
should have known, that evidence is relevant to existing or future litigation
►Legal Hold Notice
► Is a communication issued as a result of current or anticipated litigation, audit,
investigation or other such matter
►Suspending the normal disposition or processing of records
►Legal holds can encompass procedures affecting active data and backup tapes
►The duty to preserve ESI BEGINS when you reasonably anticipate litigation,
for EVERY case.
► First decision – Is this a case, yet?
► Next - Scope and Method
► WHAT needs to be preserved?
► HOW should it be preserved?
► Key Consideration - Accessibility
► Difference between what needs to be PRESERVED and what needs to be
REVIEWED AND PRODUCED
► Tiered approach
Page 57
IIA / ISACA Orange County Chapters
Records Retention and the Legal Hold
►
Records Retention Policies Because ESI has become fundamental
to litigation, organizations need to have a records retention policy;
otherwise, how can an organization without such a policy explain to a
judge why certain ESI was retained and other deleted?
►
Hit the PAUSE button on Records Retention Policy for a Legal Hold
►
When you become aware that a lawsuit may occur, the records
retention policy must be changed regarding relevant records to
the litigation. The legal term for this is "litigation hold;" however, the
rules of evidence have always required potential litigants to save
evidence, and if they destroy critical evidence, they lose their case
because of the intentional destruction which is call spoliation.
Page 58
IIA / ISACA Orange County Chapters
How to Select and Prepare the FRCP 30(b)(6)
Deposition Witness in eDiscovery
►
►
►
►
His or her role is to testify not on the facts of the case, but on a company’s
operations, such as its IT infrastructure or accounting practices.
Frequently referred to as the “Voice of the Corporation”, the 30(b)(6) witness’s
testimony represents the knowledge of the entity, not of the person being deposed.
In the context of eDiscovery, this witness is often called to testify on the steps the
corporation took to find and produce responsive documents to ensure discovery
was diligently completed in good faith.
Topics can vary greatly
►
►
►
►
►
►
►
►
►
►
►
Page 59
Qualifications and organizational structure
Information systems
Software and email
Records management
Alternative sources of electronic information
Legacy systems
Backup and restoration procedures
Production of ESI in other lawsuits
Location and access to ESI
How ESI is maintained
How this data was preserved for the subject litigation
IIA / ISACA Orange County Chapters
The Rule 26(f) Meet & Confer
► FRCP §26(f) - A pre-trial conference provision mandates that the parties
shall confer with regard to anticipated electronic discovery issues, and address
these issues to court at the preliminary conference.
►
►
►
►
►
►
►
►
►
Page 60
Implementation of a data preservation plan
Identification of relevant data
Scope, extent and form of production
Anticipated cost of data recovery and proposed
►initial allocation of such cost
Disclosure of the programs and manner in which the data is maintained
Identification of computer system(s) utilized
Identification of the individual(s) responsible for data preservation
Confidentiality and privilege issues
Designation of experts
IIA / ISACA Orange County Chapters
Timeline-Initiation to Scheduling Order
Initiation of Litigation
- Day 1 -
Scheduling Order
- Day 120 -
•Deadline for confer
– Disclosure or discovery of ESI should be
handled…
– Brief description of parties’ proposals (Form 35)
•Begin to discuss and document proposals
–
Secure a cost effective reasonable agreement favorable to your
case
–
Create a record of good faith and cooperation
–
Maximize cost shifting opportunities
–
Solidify preservation, privilege, reduction strategies
•Assess electronic evidence early
– Collect and review subset of key custodians/tapes
– Extrapolate for budget and scheduling discussions (total cost of
discovery)
– Test search term, sampling and other culling strategies
– Test privilege/clawback/quick peek strategy
•Meet with key custodians, IT, Records management
–
Determine compliance with legal hold
–
Ascertain costs of preservation
–
Assign tasks for mandatory disclosures (gather existing
documentation)
–
Assess appropriate “person most knowledgeable”
•Complaint served
–
Latest day for preservation obligation to attach
–
Litigation hold notices
–
Suspension of appropriate destruction policies
Page 61
IIA / ISACA Orange County Chapters
Difference between eDiscovery & Email Archiving
Solutions
►For eDiscovery, relevant information may be found in:
►unstructured,
►semi-structured or
►structured data sources
►dispersed across networks
►on desktops, laptops, servers, shares, removable storage media, etc.
►eDiscovery is the practice of identifying, collecting, preserving, processing,
reviewing and producing relevant ESI from all data sources
►Email archiving systems, on the other hand, were designed to conduct email
management and work with the set of emails that reside in the archive, and do
not extend to all data on the network.
►Even if an organization uses an archive system, they must have a scalable
capability to identify potentially relevant information from the
unstructured/ unmanaged environment.
Page 62
IIA / ISACA Orange County Chapters
Difference between Archiving vs Backup
Solutions
Archive
►
►
Backup
Archives are the primary sole copy of static or
persistent information
Value is retained for future reference (months,
years or decades)
►
Authenticity and inalterability must be assured
►
It is typically in its final form, and subject to
limited or no modification
►
Archives focus on access and retrieval of a
specific informational items vs. an entire
volume restore
►
Archival processes often include specific
timeframes; including restore or deletion
►
Archives may be refreshed regularly and the
information stored is maintained long-term
Page 63
►
Backups constitute raw content and
contain no means to enable search.
►
Data integrity is not guaranteed. Due to
age, mishandling or corruption (tapes)
►
Backups are a snapshot of data that is
generated at that point in time.
Between backups, data could have
been created, modified and/or deleted
Backups are secondary copies of
primary information.
►
►
Backups provide short-term protection
of production data to ensure business
continuity, and are systematically
overwritten.
►
Backup solutions are appropriate
solutions for business continuity and
disaster recovery.
IIA / ISACA Orange County Chapters
Market Needs: Handling ESI
► “The
real opportunity for worthwhile ROI lies in reducing the
number of responsive documents to a sufficient set. This is the
heart of Early Case Assessment…
►
The new tools will enable attorneys to handle multiple matters with
overlapping custodians more efficiently and to take a consistent approach
to the handling of ESI from case to case.”
–
Page 64
Gartner report, "Reduce the Cost and Risk of E-Discovery in 2009” (ID Number:
G00164554, 9 January 2009)
IIA / ISACA Orange County Chapters
eDiscovery / Legal Hold Case Law:
Notification alone is insufficient
►
In re Hawaiian Airlines, Inc.
The Court issued an adverse inference instruction
because they “simply told [the custodian] to
preserve all evidence and trusted him to comply”,
rather than taking reasonable steps to prevent
spoliation, the Company facilitated misconduct
even though it was the custodian who acted in
bad faith. 2007 WL 3172642 (Bkrtcy. D.Hawaii
October 30, 2007).
►
In re NTL, Inc. Securities Litigation
“Although NTL sent out hold memos in March
and June 2002… those hold memos were not
sufficient…” (citing Zubulake). Failure to
implement proper ESI preservation process is
“gross negligence” 244 F.R.D. 179 (S.D.N.Y.
2007)
Page 65
IIA / ISACA Orange County Chapters
eDiscovery / Legal Hold Case Law:
Custodian Self-Collection is insufficient
►
Wachtel v. HealthNet, 239 F.R.D. 81 (D.N.J. 2006); Court states
that “Health Net’s process for responding to discovery requests was
utterly inadequate”
► “Health Net relied on the custodians within the company to search
and turn over whatever documents they thought were responsive,
without verifying that the searches were sufficient. The process, in
sum, was one of looking for selected specific documents by a specific
person rather than all responsive documents from all Health Net
employees who had such documents. Many of these specific
employee-conducted searches managed to exclude inculpatory
documents that were highly germane to Plaintiffs' requests.”
►
Cache La Poudre Feeds, LLC v. Land O’Lakes, Inc., 244 F.R.D.
614 (D.Colo. 2007); Court faults Land O’Lakes for simply directing
employees to produce relevant information, and then relied upon those
same employees to exercise their discretion to determine what
information to save
Page 66
IIA / ISACA Orange County Chapters
No Requirement to Preserve
Non-Relevant Data for Litigation
►
The Duty to Preserve Extends to Only Potentially
Relevant Information
►
Zubulake v. UBS Warburg LLC, 220 F.R.D. 212, 217
(S.D.N.Y. 2004) (“Zubulake IV”)
►
►
“Clearly” no duty to “preserve every shred of paper, every e-mail
or electronic document, and every backup tape…Such a rule
would cripple large corporations.”
However, Previously No Effective Way to Separate the
Wheat from the Chaff at the Point of Collection
►
Page 67
Result: Either non-compliance or over-collection
IIA / ISACA Orange County Chapters
How broad reaching is the hold
on potentially relevant documents?
►
Micron Technology, Inc. v. Rambus, Inc., C.A. No. 00-792-SLR on
January 9, 2009, declaring certain patents unenforceable as a
sanction for spoliation.
►
In a suit for patent infringement, Micron claimed Rambus employed
a document retention policy that destroyed documents while
they had a duty to preserve.
►
The Court said that Rambus was an “aggressive competitor” so
should have foreseen litigation as far back as December
1998. All relevant documents destroyed by Rambus after that time
was spoliation.
►
As a sanction, the Court decided the patents at issue were not
enforceable against Micron.
Page 68
IIA / ISACA Orange County Chapters
eDiscovery changes the way we think
about data storage and retention policies
►
Omnicare, Inc. v. Mariner Health Care Mgmt. Co., 2009 WL 1515609
►
In Omnicare, the Court ruled that just because data is on a backup tape
doesn’t automatically make it ‘not reasonably accessible.’
►
Omnicare sued Mariner for breach of contract and moved to compel Mariner
to restore backup tapes to retrieve old emails deleted pursuant to their
data retention policy.
►
The Court looked to Zubulake to analyze the cost-shifting argument, and
decided that cost-shifting was not warranted in this case, noting that just
because “ESI is now contained on Backup Tapes instead of in active
stores does not necessarily render it not reasonably accessible.”
►
Nonetheless, the Court opted not to order the restoration, opting instead for
the active file sampling Mariner proposed.
Page 69
IIA / ISACA Orange County Chapters
Zubulake Court’s suggestion of a Defensible
collection and preservation Process
1.
Run system-wide keyword search
2.
Use a broad list of search terms (from Legal)
3.
Search for a limited time-frame (determined by Legal)
4.
Segregate and preserve responsive documents (the “hits”)
5.
Opposing counsel will make a demand for production of documents
6.
Legal negotiates with opposing counsel on proper list of keywords
7.
This keyword search conducted only against the preserved “hits”
Page 70
IIA / ISACA Orange County Chapters
If you cannot demonstrate a Defensible Process
►
Mudron v. Brown & Brown, Inc., 2005 WL 645927
(N.D.Ill., Mar. 17, 2005)
Page 71
►
Defendant apparently had not conducted its own comprehensive search and
production of digital data
►
Plaintiff “filed a motion for discovery sanctions and other relief alleging that he has
been consistently denied electronic data that is in [defendant's] control which may
be relevant . . . [The Court] ordered that [plaintiff’s] forensic expert be allowed
access to [defendant’s] computer drives to obtain forensic images.”
►
Court granted plaintiff’s expert access to company’s network
►
compromised legal position
►
substantial disruption of operations
IIA / ISACA Orange County Chapters
Four Steps for Legally Defensible Retention
Policies
►
Step 1: Companies must have a clear written document retention policy and
schedule that meets its business needs and is fully endorsed by senior
management. The policy should define when, where and by whom those
records that are required by law or contract, or are otherwise deemed valuable to
the company, are routed to appropriate archives, and those records no longer
required are to be properly destroyed. Companies also must specify the
means of destruction.
►
Step 2: Companies must take reasonable steps to ensure that this policy is
effectively communicated to employees, and is actually followed (e.g.,
periodic audits, compliance days, certifications). Haphazard implementation
will not provide a defence in a negligent spoliation claim.
►
Step 3: Companies must enact administrative procedures that will
immediately stop the routine destruction of records when and if they become
the subject of corporate governance, regulatory or legal concerns.
►
Step 4: Companies must guide and train all employees on how to prepare
effective, accurate records.
Page 72
IIA / ISACA Orange County Chapters
eDiscovery: Sanctions Result In 35% of Decisions
Addressing These Issues
►
Mr. Perry L. Segal, an IT executive turned e-discovery attorney and consultant reports in “EDiscovery: New Rules, Big Headaches,” published in the September 2009 California Lawyer.
►
►
“… it’s estimated that out of all case law that
addresses e-discovery issues, more than 35%
result in sanctions.”
Tackle e-discovery with the “W5+H” approach:
► Who should be involved?
► What data are you looking for?
► When are the due dates?
► Where is the data?
► Why is it relevant?
► And how will you comply?
Page 73
IIA / ISACA Orange County Chapters
Selected Sanctions Decisions:
►
Coleman Holdings v. Morgan Stanley, (Fla. App. 4th Dist. Mar. 21,
2007) – $1.45 billion in compensatory and punitive damages.
Judgment reversed, but …
►
Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2900537 (S.D.Cal
Jan., 2008) - court sanctioned Qualcomm for concealing thousands
of pages of relevant e-mails $8.5 million atty fees.
►
In re Sept. 11th Liab. Ins. Coverage Cases, 2007 WL 1739666
(S.D.N.Y. June 18, 2007) - Court Imposes $1,250,000
►
In re Seroquel Prod. Liab. Litig., 2007 WL 2412946 (M.D.Fla. Aug.
21, 2007) - Sanctions for Purposeful Sluggishness in Discovery
Page 74
IIA / ISACA Orange County Chapters
Court Sanctions Qualcomm
$8,568,633, Orders Counsel Sanctioned
►
Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2900537 (S.D.Cal
Sept. 28, 2007)
►
►
►
►
Page 75
Cross-examination of the plaintiff’s witness revealed the existence of relevant emails that the court later held were “the tip of the iceberg” in an attempt to
conceal over 200,000 pages of relevant e-mails.
The court found by clear and convincing evidence that Qualcomm’s counsel
engaged in misconduct by providing calculatedly misleading and false discovery
responses, asserting patently false statements of fact during motion hearings,
minimizing the significance of missing e-mail at trial, continuing through post-trial
activity.
The judge characterized the discovery abuses as, “an organized program of
litigation misconduct” and ordered the plaintiff’s attorneys to demonstrate why they
should not be sanctioned, without use of documents protected by the attorneyclient privilege.
See also Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2261799
(S.D.Cal. Aug. 6, 2007); Qualcomm, Inc. v. Broadcom Corp., 2007 WL
2296441 (S.D.Cal. Aug. 6, 2007); Qualcomm, Inc. v. Broadcom Corp.,
2007 WL 1031373 (S.D.Cal. March 21, 2007).
IIA / ISACA Orange County Chapters
Court Imposes $1,250,000 in Sanctions
for eDiscovery Violations
►
In re Sept. 11th Liab. Ins. Coverage Cases, 2007 WL
1739666 (S.D.N.Y. June 18, 2007)
►
►
►
Page 76
Port Authority and Westfield moved for sanctions, alleging Zurich’s
position throughout the pleadings was objectively unreasonable in
violation of Rule 11 of the Federal Rules of Civil Procedure (“FRCP”) and
the discovery abuses violated FRCP 37.
The court held Zurich and its counsel liable for $1,250,000 based on
violation of both Rules.
As Zurich deleted the electronic version of an essential document
and possessed the paper version for over three years before
producing it, the lease holders were successful in meeting the
burden for the court to impose sanctions. The court determined the
$1,250,000 was sufficient to deter repetition of such conduct or
comparable conduct by others similarly situated.
IIA / ISACA Orange County Chapters
Automated Predictive Coding
Validation and defensibility
Silva Moore v. Publicis Groupe, No. 11 Civ. 1279
(ALC) (S.D.N.Y. Feb. 8, 2012)
►Da
►
►
“What the Bar should take away from this Opinion is that
computer-assisted review is an available tool and should
be seriously considered for use in large-data-volume cases
where it may save the producing party (or both parties)
significant amounts of legal fees in document review.”
“As with keywords or any other technological solution to
eDiscovery, counsel must design an appropriate process,
including use of available technology, with appropriate
quality control testing, to review and produce relevant
ESI while adhering to Rule 1 and Rule 26(b)(2)(C)
proportionality. Computer-assisted review now can be
considered judicially-approved for use in appropriate cases.”
Page 77
IIA / ISACA Orange County Chapters
Predictive Coding
Validation and defensibility
►Global
Aerospace, Inc. v. Landow Aviation, L.P.
No. CL 61040 (Vir. Cir. Ct. Apr. 23, 2012)
► Court-ordered
use of technology assisted review over opposing party’s objection
► In response to defendant’s motion requesting that either predictive technology be
allowed or that plaintiff pay any additional costs associated with traditional review
►Kleen
Products v. Packaging Corp. of America,
No. 10-C-5711 (N.D. Ill.)
► Technology
assisted reviewed leveraged to ensure the accuracy of defendants'
document production
► Judicial endorsement of Sedona principles regarding cooperation & quality
►EORHB,
Inc., et al v. HOA Holdings, LLC, C.A.,
No. 7409-VCL (Del. Ch. Oct. 15, 2012)
► Bench
order requiring both parties to use technology assisted review or “to show
cause why this is not a case where [TAR] is the way to go.”
Page 78
IIA / ISACA Orange County Chapters
Document review development
Bankers boxes
► Start/stop sheets
► Photocopies
► Manual logs
► Lawyer driven
►
1990
Megabytes
► Linked databases
► File conversion
► Extracted text
► Outsourcing
►
1995
2000
Computers
► Databases
► Imaging
► Tagging
► OCR
►
2005
2010
Gigabytes
► Native review
► Data processing
► Keywords
► Project managers
►
ESI volume
Page 79
Terabytes
► TAR
► Dual monitors
► Data analytics
► Managed review
►
IIA / ISACA Orange County Chapters
Document review development
Petabytes
► Ernst & Young's
technology-assisted
review
► SME reviewers
► Statistical validation
►
The world's information is more than doubling
every two years, with an estimated 1.8 zettabytes
created in 2011 – the equivalent
of roughly 1.8 billion desktop computers
►
90% of the data in the world today has been
created in the last two years alone
►
The continued application of antiquated workflows
to modern data sets results in expensive reviews
that take months or years to complete with no
measurable degree of quality or consistency
►
Ernst & Young's technology-assisted review
solutions allow you to find what
is relevant much faster – often in only a matter of
weeks – with statistically validated results that are
repeatable, transparent
and defensible
►
2012
Page 80
IIA / ISACA Orange County Chapters
Technology Assisted Review landscape
Standard processing and review
Processing
Pre-culling
Linear Review
►Deleted file recovery
►Aliases
►Review platform
►Deduplication
►Dates
►Workstations
►De-NISTing
►File types
►First level and quality review
►Text extraction
►Locations
►Email threads
►Metadata extraction
►Email Folders
Search
Basic search
Intermediate Search
Advanced Search
Expert Search
►Key terms
►Key terms in context
►Concepts
►Natural Language Processing
►Boolean
►Key term variants
►Synonyms
►Ontologies
►Inter-document context
►Term disambiguation
►Clustering
►Acronyms
Automation
Advanced Search Technology
Page 81
Machine Learning Algorithms
Sampling
►Entity extraction
►Statistical clustering
►Random
►Tools to build complex queries
►Latent Semantic Analysis (LSA)
►Systematic
►Social Networks
►Probabilistic Latent Semantic Analysis (pLSA)
►Stratified
►Language identification
►Vector space model
►Proportional
►Segmentation
►Latent Dirichlet Allocation (LDA)
►Biased
IIA / ISACA Orange County Chapters
Technology-assisted review observations
► Faster
and more efficient first level review
►
Model substantially exceeds first level review performance
►
Demonstrates the ability to adapt and improve
►
Demonstrates the ability to predict high quality results and bulk
code very large datasets in a compressed timeframe
► Deeper
insight into the data
►
Demonstrates the ability to identify key trends within the data
►
Galvanizes review definition by forcing conflict resolution
► Better
advocacy
►
Better understanding of how data relates to themes
►
Identify first order and second order hot documents
Page 82
IIA / ISACA Orange County Chapters
Predictive coding
methodology
Scientific methodology insists that hypotheses be tested in controlled
conditions which can be reproduced by others.
1. State the problem
Question
2. Gather information
3. Form a hypothesis
Research
4. Test the hypothesis
Hypothesis
5. Record and analyze data
Test
6. State the conclusion
Analyze
7. Repeat the work
The requirements of
experimental control and
reproducibility diminish the
effects of cognitive bias
Page 83
True
False
Report
Repeat
IIA / ISACA Orange County Chapters
Predictive coding
decision tree
Create
project
Initial
sampling
Conflict
resolution
Conflict
resolution
Results
satisfactory?
N
Model
building
sampling
N
Results
satisfactory?
Y
Bulk
code
Y
Validation
round
Y = Yes
Page 84
N = No
Conflict
resolution
IIA / ISACA Orange County Chapters
Reporting
Predictive coding
data driven process
Decision points informed by real-time results
Conflict
Resolution
Create Project
Rounds
Any number of predictive
coding projects can be
created and controlled
within a single Relativity
project.
A round of stratified
random sampling is
conducted by a small team
to drive system results.
A project can be used for
assorted purposes,
including identifying high
precision sets for quick
turnaround rolling
productions and
identification of hot
documents.
A team typically consists of
three to four experts.
An initial sample jumpstarts the process of
training the system and
dividing the dataset into
desired section.
Iterative model
improvement samples may
be required for further
system training.
A final sample is drawn to
validate the results.
Page 85
Results
Reporting
The system is designed to
identify potential
disagreements between
expert reviewers and to
enable resolution of each
disagreement by a
designated review team
leader.
Projected results are
provided after each
sampling round.
The Reports page
provides the audit trail of
each and every predictive
coding project for any
single Relativity project.
The end product is a gold
standard control set of
samples designed to
minimize the effects of
unintended consequences.
The choices that follow the
results are to (1) provide
the system with more
training, (2) validate the
results, or (3) bulk code
the results within the
Relativity database.
The results arm the case
team with the appropriate
information to inform next
steps in the process.
The bulk-coded results are
always associated with
their specific project. This
empowers the case team
to use them for further
review, production, witness
prep, etc.
IIA / ISACA Orange County Chapters
Ernst & Young's predictive coding
multi topic modeling
► Hundreds
►
►A
of topics can be derived from any dataset
e.g., coffee, trade, money, earn, ship, …
topic or set of topics is associated with each document in a dataset
►
A single document is associated with one or more topic
►A
unique probability score is assigned to each topic on a
document-by-document basis
►
Document 1: coffee .23, money .17, trade .02, …
►
Document 2: ship .35, coffee .22, earn .12, …
► The
system predicts a result when the distribution of topics
associated with a single document corresponds to the properties
of one of the coding decisions
Page 86
IIA / ISACA Orange County Chapters
Ernst & Young's predictive coding
multi-topic example
Topics
107
Concepts
raptor:
swap:
balance:
asset:
harrier:
condor:
talon:
Scores
0.0505366246411
0.0102291363833
0.00898489388056
0.00448260133491
0.0031886556012
0.00296781198298
0.002835555109413
185
swap:
raptor:
hedged:
jedi:
hedge:
hedges:
balance:
0.0514520199598
0.0308784376651
0.0078593372283
0.00610262728228
0.00581558674364
0.00245189742511
0.00179358246048
236
swaps:
hedge:
hedges:
0.0333760267552
0.0319537790458
0.0109633042564
390
security:
asset:
underlying:
0.00944631119958
0.00668004462427
0.00281486364346
calpers:
0.000972035033758
377
Page 87
Document
From: Scott Sefton
Sent: Wednesday, August 30, 2000 8:38 PM (GMT)
To: Julia Murray
Cc: Gordon McKillop; Ryan Siurek; Trushar Patel;
Stuart Zisman; Mary Cook; Sara
Subject: Raptor Hedges
Topic
proportions
and
assignments
I thought I'd communicate to the group some recent
developments.
1. Gordon and Ryan advise that the swaps for
assets in JEDI 1 and 2 will cover our
proportionate economic interest in the asset
within JEDI. Gordon believes the spreadsheet
of proposed swaps reflects this. The swap will
be between Harrier and Talon and there will be
no back-to-back swap with JEDI. There should
be no required disclosures to CalPERS
resulting from these hedges.
2. Gordon and Ryan advise that for assets
currently on our balance sheet that are hedged
with Raptor and then sold to Condor, there
will be no reduction in the hedge or any backto-back hedge when it moves into Condor. The
swap will be between Harrier
and Talon.
3. Mark Taylor and Bob Baird have concluded that
the swaps can be terminable by Harrier if the
underlying security is sold.
IIA / ISACA Orange County Chapters
► Each
topic is a
distribution over
words
► Each document
is a mixture of
corpus-wide topics
► Each word is drawn
from one of those
topics
Methodological overview
►
Concept induction
►
►
Fact pattern analysis
►
►
Emotive tone detection, dialogue act classification
Social network and actor analysis
►
►
Fact extraction, workflow analysis, coherence assessment
Linguistic analysis
►
►
Ontologies, concept mining, entity extraction
Internal and external
Predictive modeling techniques
►
Page 88
Supervised and unsupervised
IIA / ISACA Orange County Chapters
Concept mining
►
Automatic detection of:
►
►
►
►
Jargon
Abbreviations and acronyms
Euphemisms
Examples
►
►
►
►
Page 89
NCM is involved as the clmt is looking at his 4th Sx
He hopes to RTW for the INS if his sx will decrease
RTW Plan: NCM will facilitate appropriate surgical tx
Clmt has not RTW in any capacity at any time since DOI
IIA / ISACA Orange County Chapters
The Future of eDiscovery:
Where to From Here
Take a PROACTIVE APPROACH to your ESI
►
Reduce Risk – Keep your organization OFF the Front Page of
the Wall Street Journal
►
►
►
►
►
Page 90
Understand your Network
Create a Data Map
Define Policies and Procedures
Make friends with the other Departments!
Coordinated global eDiscovery Management
IIA / ISACA Orange County Chapters
The Future of eDiscovery:
Where to From Here
►
Understand Major Corporate Challenges:
Your Network!
►
►
►
►
Dispersed network of unmanaged, unstructured, semi-structured and
structured data.
ESI Search and Collection software is limited by the size of your pipes
and the power of your hardware.
eDiscovery in the Cloud?
Privacy Laws – for organizations with Global reach
►
►
►
Page 91
EU Data Privacy Laws
German Works Councils
France – they will throw you in jail!
IIA / ISACA Orange County Chapters
The Future of eDiscovery:
Where to From Here
Conduct Early Case Assessment
►
IT: Involves project scoping from a data collection/processing stance
►
►
►
►
Legal: An early assessment of the issues they care most about
►
►
►
►
How best to be able to demonstrate that their process is “defensible” (reasonable)
How best to put a litigation hold in place and accomplish defensible preservation
Potential strategic advantages, or cards to play, when at meet-and-confer stage
Important to document advanced thinking that went into choosing
►
►
►
where does the data reside
what sources are going to be challenging to collect
what is the volume of data that needs to be collected
Which custodians should be targeted for preservation
What search criteria should be used for collecting ESI from those custodians for
preservation?
Need advanced testing/sampling
Page 92
IIA / ISACA Orange County Chapters
The Future of eDiscovery:
Where to From Here
Get to Know the Special Masters in Civil Litigation
►
►
►
Special Masters are appointed by the courts under Rule 53, Federal
Rules of Civil Procedure, to act as assistants to the court for the
supervision of eDiscovery related issues.
Fill the competency void created by one or all of the other actors in
the dispute resolution process: lawyers, litigants, and judges.
Four different roles for e-Discovery Special Masters:
►
►
►
►
Page 93
facilitating the electronic discovery process;
monitoring discovery compliance related to ESI;
adjudicating legal disputes related to ESI; and
adjudicating technical disputes and assisting with compliance on
technical matters, such as conducting computer/system inspections.
IIA / ISACA Orange County Chapters
Thank you
Matthew L. Miller, Esq.
Assurance Services
Fraud Investigation & Dispute Services
Matthew.Miller@ey.com
212.518.4204
Page 94
IIA / ISACA Orange County Chapters
Download