Category Archives: Back to Basics

Cost to Redact 10,000 Docs?

Assume you have 10,000 documents that average 6 pages each. Let us also pretend that we have an attorney on hand that can redact one page every every three minutes. Let’s also say this attorney charges $55 an hour for her services, and an identical attorney will be double checking each redaction for accuracy at a pace of 200 pages per hour.

If every page required redaction and all the variables held true across the entire life of the project, the total out of pocket expense for redacting 60,000 pages would run just over $180,000.

The key to cutting costs is to increase the pace of applying each redaction, increasing the accuracy to reduce time spent performing quality control checks, and reducing the cost of the hourly rate. To get a sense of what attorney rates are for 2017 check out the Salary Guide published yearly by Parker + Lynch at

Unfortunately, there is no magic bullet that exists in the tech industry that will automatically do all the work for us. There are some great tools available that assist with identifying and redacting specific text strings and patterns, but at the end of the day, this is still a manual process that is often very precise in nature.

When dealing with large volumes of information that require redaction the most cost-effective and accurate solutions available will be found from service providers that can blend the best technology available with the right group of experienced attorneys. To see how one provider addressed some of these challenges check out the recently released case study found at


Various Viewpoint Document Viewers

Learn how to use Viewpoint’s different document viewers.

For more information about eQ visit

Customizing Viewpoint Layouts

Understanding how to find, dock and navigate Viewpoint’s available interface panels; and how to save your layout.

Click the expand button to view full screen.

Viewpoint Message Board

How and when to use Viewpoint’s message board.

2015-10-30_13-45-08Click the expand button to view in full screen mode.

Additional Resources:

Essential eDiscovery Extras: Unlock Virtual Desktops in Win7+

Being a bit of a linux and mac geek I’ve always loved the feature baked in to the OS that allowed me have multiple virtual work spaces.  However, working in eDiscovery I’m largely forced to live and die in a Windows environment. (Although I can still get my unix command line through Cygwin).

After reading a post recently, titled How I get Work Done at Work (, a simple google search found the following article from our friends at

Get Virtual Desktops

While Microsoft’s Virtual Desktops PowerToy hasn’t worked since Windows XP, they do provide another tool that will let you use virtual desktops on modern versions of Windows. The tool is small, lightweight, and free. You don’t have to pay up, deal with nag screens, or deal with a cluttered application to use them.

Download Desktops v2.0 from MIcrosoft’s Windows Sysinternals site. Sysinternals was once a third-party collection of tools, but the Sysinternals tools are so useful and powerful that Microsoft bought them all a few years ago. If you’re a Windows power user, you should get familiar with the SysInternals tools. Most of them are powerful system utilities full of useful information — not small tools like this one.

Unlock Virtual Desktops on Windows 7 or 8 With This Microsoft Tool
Unlock Virtual Desktops on Windows 7 or 8 With This Microsoft Tool

You Can Teach an Old Lawyer New Tricks

BP-Busienss-Man-Photo“Just print it out for me.”

Famous last words said by many an attorney in today’s technology-laden litigation field. There was a time, (cue nostalgic flashback music), when the largest matters would consist of a few hundred boxes of paper. Today, the sky’s the limit when it comes to the amount of records that can exist in a single case.

When the information age started spilling over into the legal profession, there were few, if any, technical solutions to the technology problem we were all facing. When a client inbox needed to be collected and reviewed for discovery, we did just that: “print it all out.” It did not take long before the very same approach would just about fill the Grand Canyon with dead trees.

As the amount of information being created by our business clients continued to grow, the technology designed to combat the problem got better and faster. Innovation came fast and hard over the next few years, resulting in the birth of eDiscovery.

Today, we find ourselves firmly in the adolescence of industry growth, with more specialists, uniform standards and best practices. The software solutions continue to advance at a trailblazing pace and, at times, even claim to be smarter than we humans. However, keeping up with this technology can be (and often is), a job in and of itself.

So, how are those tasked with supporting the efforts inside of a law firm supposed to keep pace? More importantly, assuming you can keep pace, how do you fight the “just print it out” mentality that exists in virtually all firms across the land? A recent study [1]was conducted that concluded that there is “a profound lack of technological savvy among law firms.” [2]

The most impressive advancements over the last couple of years have surrounded buzzwords like predictive coding and advanced analytics. In a nutshell, these are specialized software tools designed to speed up the pace of review to eliminate as much hourly billable labor as possible during the discovery process. One major caveat is, that if leveraged improperly, one can find herself in a pretty hairy situation. Thus, giving credence to the statement that technology is only as good as those using it [3]. This is no real secret and has played into the trepidation within law firms to hurry up and wait to see how other firms have implemented these new solutions.

The mission of this article is to provide an oversimplified how-to primer on leveraging one (of many), advanced analytical tools as a quality control measure prior to final document production, as opposed to an alternative review methodology. In other words, there’s no need to change the way that you’re currently managing and reviewing discovery documents. This will show you (and your reluctant attorney), how to dip your toe into the shallow end of the fancy whiz-bang tech world by taking the advanced out of advanced analytics.

Let’s assume that your firm has been engaged by your client to represent them in a bet the company type litigation that involves the collection, hosting, and review of a quarter-million documents. For the sake of simplicity, let’s assume all of the documents in question are emails (and their attachments), from 10 key players within the company over a time frame of five years. Your firm has already gone through the process of:

  • selecting a vendor to assist with collecting the email data in a forensically sound manner;
  • converting the records into a easily reviewable format;
  • culling them down using basic filters; and
  • hosting them in a web-based review platform that your attorneys can access from anywhere.

At this stage, the common practice is to have a war-room of contract attorneys conduct the first-pass review of these records for responsiveness and to identify any potentially privileged documents. Typically, after varied levels of quality assurance checks, what results is then produced to opposing counsel. This is a tried and true approach that has become its own industry since the economic downturn a few years ago.

photo.JPG  2448×3264The courts, unfortunately, have given very little leeway in terms of providing realistic deadlines for production, even though the amount of data keeps growing at a break-back pace. Some courts have even started imposing sanctions for consistently missing production deadlines. [4] As a result, the directive handed down in these scenarios is always that of speed. Review more documents in less time. In turn, being that we’re all human, this has led to a number of errors. The worst among them is producing a privileged document because it was improperly tagged. This can have some serious ramifications, because it is not just the document that is privileged, but also the entirety of its content. There are countless horror stories and case studies specifically dealing with the aftermath of this particular scenario. However, for the purposes of this example, we’ll take a look at one way to prevent this from happening by utilizing “Email Thread Analysis.”

Many service providers, due to the slow adoption of advanced and predictive technologies, have started offering these services at little to no additional cost. It should not take you long to find one amongst your existing approved vendor list that would jump at the opportunity to show off their wares.

In this scenario, let’s assume that you and I are two of ten key custodians in question. We both work in the research and development division of a successful tech startup company. I sent you an email back in 2006 that contains information about the project that we’re working on together. Within the body of this email, I make reference to a number of topics that would be considered trade secrets, deeming the record privileged under the parties’ agreement. You respond back the following day with all of the original text from my email in the body of your email. This continues back and forth over the next six weeks, totaling five emails before the email chain stops.

During a traditional linear review, each email within the thread would exist as its own record and designated to a batch to which a contract reviewer would be assigned. Let’s assume that three of the five emails were assigned to one reviewer, and the other two were assigned to another. During the review, these records typically do not get grouped together for side-by-side comparison. Being that all of the content in the original message that made the document privileged also exists in every other email in the thread, it is safe to assume that every email in the conversation should be flagged as privileged. Due to the review being conducted in such a manner, it is not uncommon for one of these emails to slip through the cracks.

The simple solution in this case is to ask your provider run a simple report leveraging email thread analysis technology to identify all anomalies of this nature. In return, you’ll have a list of every single document that is about to be produced that would otherwise contain privileged information. The screen shot below illustrates an example using a five email reply chain.

Paralegal Today Q1 2014

The first branch in this tree shows the originating email in this conversation flagged as privileged. You can tell this by the red circle indicator to the left of the subject line. The second email, or first reply, is also flagged as privileged. As soon as we get to the third email, we see the green tag indicating that this record was flagged as responsive. As you can see, all subsequent emails have been flagged as privileged.

A well-versed provider with the access to the right tools can automate the process of identifying every record that has been tagged within a conversation in contradiction with others.  Usually, you would have someone put an extra pair of eyes on the record in question, along with the surrounding communication to verify that this was not in error.

While this is not an end-all be-all solution to be leveraged across all matters, it is one of many weapons that you should have in your arsenal to prevent potentially costly and embarrassing missteps. Your attorneys will not have to learn anything new, and when asked how you magically found this document, you can say “I used advanced analytics”.



Kris Wasserman is a Sales Engineer and passionate technology evangelist with over 10 years of experience working hands-on with litigators, in-house counsel, and litigation support professionals in the face of complex ESI-laden matters and regulatory investigations as an eDiscovery Project Manager. He serves as one of many subject matter experts at Superior Discovery in New York City, providing technical sales support to the business development team. Kris has recently begun providing monthly educational seminars for attorneys and legal support staff for the sole purpose of streamlining the adoption of the latest technology solutions in a client-specific and practical manner.  For more information contact Kris at or follow him on Twitter @KrisWasserman.

[1] ILTA’s 2013 Technology Survey

[2] Does Technology Leap While Law Creeps?

[3] EDI-Oracle Study: Humans Are Still Essential in E-Discovery

[4] Perils of E-Discovery Reflected in Sanctions

This article was featured in “The Paralegal Today” magazine on May 1st, 2014. 

PT Q1 2014 vX.inddWhat’s Inside Each Issue
Here is an in-depth list of all the fabulous articles, columns and features found within the pages of Paralegal Today.

Mission Statement
As the only independent magazine serving the paralegal community, Paralegal Today ’s mission is to provide intelligent, thought-provoking and practical material to its readers, such as: career and technical information to help readers excel in the workplace, coverage of national news, trends and professional happenings that affect paralegals, as well as colorful and informative pieces on unique areas and people in the profession. We encourage our readers to reach out to us with their thoughts, questions and suggestions. Paralegal Today pledges to work tirelessly to benefit its readers in the most professional and unbiased manner possible.

Brief History
In 1983, Paralegal Today put together its first issue for the paralegal community. Then a Dallas-based national publication, the magazine promised to “be as helpful and approachable as a good friend next door.” In December of 1989, James Publishing Inc. of Costa Mesa, Calif., acquired Paralegal Today. With a new look and new ideas, Paralegal Today reached out to its readers with intelligent, timely and informative articles. Paralegal Today is the independent source of information on the paralegal field. Readers subscribe to Paralegal Today to stay abreast of developments within the field and to advance their careers. Utilizing its broad-based, national contacts and resources to keep pace with the evolution of the legal assistant profession, Paralegal Today provides the tools needed by every paralegal to attain his or her career goals. After all, what are good friends for?

HOW TO: SKYPE for Dummies (and loved ones)

You can do it!

So I went to the doctor the other day and he said that I’m developing a form of ‘Repetitive Stress Injury’ in my neck.  My neck of all places!  I can only attribute this to how many times a day I shake my head back and forth followed by a self administered forehead slap. Why you ask?  Because no one in my tiny little sphere of influence knows how to use Skype?

Why am I such a hardcore proponent of Skype?  Because anything your app can do, Skype can do better!

  • Instant messaging (for all you keyboard junkies)
  • Group chat and Group video conferencing (few can compete with the group video conferencing feature)
  • A real phone number (you choose the area code)
  • Free calls to other Skype users (HELLO!)
  • Call forwarding (forward incoming skype calls to your cell phone)
  • Visual Voicemail (first to come up with this one, everyone else has been copying since)
  • File Transfers (not the fastest, but extremely easy to use)
  • Desktop/Screen Sharing (great for one on one How-To sessions)
  • Platform independant (OSX, Windows, Linux, mobile devices)
  • Integrates seamlessly with Facebook (see your news feed from the Skype home window)
  • Send and receive SMS messages (Can’t say I’ve ever used this one, but I did use a service once that converted my voicemails to text messages and sent them to my cell phone — kind of cool, although wrought with inaccuracies )
  • Unbelievably cheap international calling rates (for calling those people in countries where the internet doesn’t exist yet)
  • Outbound calling to anywhere in the US for $30 a year (untouchable)
  • An unbelievable amount of gadgets and specialized devices built just for Skype (my personal favorite –> Bluetooth Retro Handset [shameless plug])
  • A countless number of add-on apps (you name it — call recorders, faxing capabilities, lie detectors, translators, games, etc. etc.)
  • Integrates directly into web browsers (recognizes phone numbers on websites and converts them to links == single click to call)
  • To Go – Fake Forwarding (amazing feature that can be re-purposed for a number of clever uses)

The list goes on kids.  While some features cost a buck or two, most features the casual user will ever need are completely FREE.  Skype is a text book example of how to find success using the Freemium business model. Below is the first in what will likely turn into a series of Skype How-To videos.

This one is aimed at all those loved ones out there still using tin cans and string to reach out and touch when you’ve got a brand new, shiny, ultra-expensive mac laptop sitting in front of you. I can do separate videos for Windows and Linux if need be… just ask.