August 16, 2016 Practice Points

The Cautionary eDiscovery Tale Beneath the FBI's Clinton Email Probe

By David M. Stein

Buried beneath the politically-charged headlines of recent weeks regarding Secretary Hillary Clinton's emails lies a cautionary tale on a subject many lawyers and their clients give little thought: eDiscovery. From an initial document set of over 60,000 emails residing on Secretary Clinton's private servers, her legal team was tasked with identifying "work-related" emails for production to the State Department. Despite producing approximately 30,000 emails, FBI investigators identified several thousand additional emails that should have been included. On these missing emails, the FBI concluded that Clinton's lawyers relied on subject line and keyword searches in lieu of reviewing all the content of the 60,000 emails. While it is unclear what ramifications, if any, will arise for Secretary Clinton's legal team, in a civil setting such oversights could have significant consequences.

Before the advent of computer-assisted review, lawyers performing a relevancy or privilege review had to read each page of each document, which could take up to several months at considerable cost. While the option of reviewing every document collected remains an option in the digital age, newer tools are available that significantly increase review efficiency while reducing review time and costs.

The "keyword" (aka Boolean) search Clinton's lawyers used is one of the oldest and most common forms of technology assisted review. One or more words are input into software that retrieves documents containing those words or phrases. Some keyword search tools also include advanced features for recognizing and retrieving word derivatives. While the FBI report infers that Clinton's legal team used only keyword searches, other advanced options of technology assisted review are available:

Concept Search: A concept search is more advanced than a keyword search, and includes an algorithm that analyzes variables such as proximity and frequency of words or phrases. This tool typically retrieves more documents than a keyword search because it identifies conceptually related documents that may not contain the original keyword(s).

Discussion Threading: Discussion threading algorithms dynamically link related documents (usually email messages) into chronological "threads" representing entire discussions. This simplifies the process of identifying participants to a conversation and provides further insight into the substance of the conversation.

Clustering: Clustering algorithms automatically organize a large collection of documents into different topic groupings, which gives the user an idea of how the document set is organized.

Find Similar: This tool automatically retrieves other documents related to a particular document, which provides full context for the document under review.

Predictive Coding: Predictive coding software "learns" to segregate desired data/information from a larger set. The user reviews a small data set and "teaches" the software which documents in the review set are desirable (e.g., privileged, relevant, responsive, etc.). The tool then applies what it learned to the entire document set to identify desired documents.

No matter which analytic tool (or combination of tools) is selected, defensibility is paramount. That is, if challenged in court, a party must not only be able to explain why it selected the tool(s) it used, but also be able to demonstrate that the tool(s) actually worked. In the FBI's review of Secretary Clinton's emails, defensibility did not play a role, but in a civil case the inability to defend the effectiveness of your client's document review methodologies can lead to significant discovery sanctions.

Even a simple keyword search may be subject to significant scrutiny. As demonstrated by the FBI findings, merely selecting a "best guess" list of keywords is insufficient. In addition to cooperation, whether between opposing parties or between a client and his/her legal team, to establish a defensible process, courts have ruled that some quality control is necessary. For example, selected search terms can be tested against a random subset of the data to be searched, and that subset reviewed to verify that the search terms successfully identified the relevant documents therein.

The need for such attention to detail, and documentation thereof, will only increase as it is estimated that the volume of data managed by IT professionals will increase fifty-fold from 2011 to 2020. This is especially true in industries such as consumer products and services, where voluminous data retention is commonplace. Whichever tools are used for eDiscovery, great care must be taken in their selection, application, and verification to ensure a defensible product should the review process come under judicial scrutiny. A judge's ruling that the selected tools and methods used to identify and produce discoverable information lacks defensibility can result in significant monetary fines, or even adversely affect the outcome of the case.

Keywords: products liability, litigation, Hillary Clinton, emails, eDiscovery, data security

David M. Stein is with Adams and Reese, LLP, in New Orleans, Louisiana.


Copyright © 2016, American Bar Association. All rights reserved. This information or any portion thereof may not be copied or disseminated in any form or by any means or downloaded or stored in an electronic database or retrieval system without the express written consent of the American Bar Association. The views expressed in this article are those of the author(s) and do not necessarily reflect the positions or policies of the American Bar Association, the Section of Litigation, this committee, or the employer(s) of the author(s).