SlideShare une entreprise Scribd logo
1  sur  26
Recommind Proprietary & Confidential
The Ethics of Predictive Coding
Developing strategy, implementing
tactics, and avoiding ethical traps
ACEDS Membership Benefits
Training, Resources and Networking for the
E-Discovery Community
Join Today! aceds.org/join
Exclusive News and Analysis
Weekly Web Seminars
Podcasts
On-Demand Training
Networking
Resources
Jobs Board & Career Center
bits + bytes Newsletter
CEDS Certification
And Much More!
“ACEDS provides an excellent, much needed forum to train, network and stay current on critical
information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
ENTER
‘ETHICS20’
Recommind Proprietary & Confidential
Speakers
Philip Favro
Senior Discovery Counsel
Recommind, Inc.
Gareth Evans
Litigation Partner
Gibson, Dunn & Crutcher
Stacey Blaustein
Corporate Litigation Counsel
International Business
Machines, Inc.
Recommind Proprietary & Confidential
2
1
3
4
5
What is Predictive Coding?
Strategy and Tactics
Ethical Traps
Defensibility
Resources / Q & A
Agenda
Recommind Proprietary & Confidential
• DOJ has sued Acme Corp. under the
False Claims Act for $2.5 billion in damages
• DOJ is seeking responsive ESI from a
universe of 20 million Acme documents
• Acme is looking at various options to expedite
its production of responsive ESI to DOJ,
including the use of predictive coding
Hypothetical
Recommind Proprietary & Confidential
What is Predictive Coding?
Recommind Proprietary & Confidential
Judicial Definition of Predictive Coding
“Under predictive coding, the software
‘learns’ a user's preferences or goals; as
it learns, the software identifies with
greater accuracy just which items the
user wants, whether it be a song, a
product, or a search topic.”
In re Biomet, 2013 U.S. Dist. LEXIS 84440,*3
(N.D. Ind. Mar. 25, 2013)
Recommind Proprietary & Confidential
Another Court Definition of Predictive Coding
“Through iterative learning, these methods
(known as ‘computer-assisted’ or ‘predictive’
coding) allow humans to teach computers
what documents are and are not responsive
to a particular FOIA or discovery request and
they can significantly increase the
effectiveness and efficiency of searches. ”
Nat'l Day Laborer Org. Network v. United States Immigration &
Customs Enforcement Agency, 877 F. Supp. 2d 87, 109 (S.D.N.Y., 2012)
Recommind Proprietary & Confidential
Strategy and Tactics
Recommind Proprietary & Confidential
To Disclose or Not To Disclose?
How many of you agree with the
following statement?
“Advise opposing counsel that you
plan to use computer-assisted coding
and seek agreement; if you cannot,
consider whether to abandon
predictive coding for that case or go
to the court for advance approval.”
Da Silva Moore v. Publicis Groupe, 287 F.R.D. 182, 184 (S.D.N.Y. 2013)
Recommind Proprietary & Confidential
• Will the training set be randomly selected,
targeted, or a hybrid of both?
• Will opposing counsel be allowed to help
develop the training set?
• How will you address the disclosure of
non-responsive and privileged materials
in the training set?
How Will The “Seed Set” Be Handled?
Recommind Proprietary & Confidential
No Obligation to Disclose Non-Responsive Documents
In re Biomet, 2013 U.S. Dist. LEXIS 172570, *3 (N.D. Ind. Aug. 21, 2013)
“The Steering Committee wants the whole
seed set Biomet used for the algorithm's
initial training. That request reaches well
beyond the scope of any permissible
discovery by seeking irrelevant or privileged
documents used to tell the algorithm what
not to find.”
Recommind Proprietary & Confidential
Other Key Considerations
• Will discovery be staged?
• How to accurately determine prevalence?
• Will clearly non-responsive ESI be removed
before training the predictive coding tool?
• What score assigned to a particular
document will be the production cut-off
point?
• How are you handling privilege reviews?
• What is your validation process?
Recommind Proprietary & Confidential
Ethical Traps
Recommind Proprietary & Confidential
• Safeguarding Work Product
• Protecting Privileged Materials
• Satisfying the Rule 26(g) Certification
Common Ethics Traps Associated with Predictive Coding
Recommind Proprietary & Confidential
“The Steering Committee wants to know, not
whether a document exists or where it is, but
rather how Biomet used certain documents
before disclosing them. Rule 26(b)(1) doesn't
make such information disclosable. The only
authority the Steering Committee cites is a
report of the Sedona Conference . . .”
No Obligation to Disclose Opinion Work Product
In re Biomet, 2013 U.S. Dist. LEXIS 172570, *4 (N.D. Ind. Aug. 21, 2013)
Recommind Proprietary & Confidential
• Should privileged materials be culled from
the universe of potentially responsive ESI?
• How can the privilege be protected if a
negotiated protocol requires privileged
materials be included in the seed set?
• What search methods and quality control
measures are in place to identify privileged
materials before production?
• Is there a Rule 502(d) order in place?
Implementing Privilege Safeguards in the Review Process
Recommind Proprietary & Confidential
• Must you disclose the use of predictive
coding and/or enter into a stipulated
protocol to comply with Rule 26(g)(1)(B)?
• If you fail to do so, could you be
precluded from using predictive coding?
Satisfying the Rule 26(g) Reasonable Inquiry Standard
Progressive v. Delaney, 2014 U.S. Dist. LEXIS 69166 (D. Nev. May 19, 2014)
Recommind Proprietary & Confidential
Defensibility
Recommind Proprietary & Confidential
• Have a well-documented process
• Demonstrate that the process is
reasonable; perfection not required
• Consider whether to disclose PC use;
agreements on front-end might be
beneficial, but could still be problematic
Defending the Process
Recommind Proprietary & Confidential
Resources / Q & A
Recommind Proprietary & Confidential
Resources
Hon. Patrick J. Walsh,
Rethinking Civil Litigation in Federal District Court,
40 LITIG. 6, 7 (2013)
Dana A. Remus,
The Uncertain Promise of Predictive Coding,
99 Iowa L. Rev. 1691 (2014)
Recommind Proprietary & Confidential
RESOURCES
http://www.recommind.com/mind-over-matters
Recommind Proprietary & Confidential 25
Q & A
Recommind Proprietary & Confidential 26
Thank you!!
Philip J. Favro
Senior Discovery Counsel
phil.favro@recommind.com
(650) 714-9134

Contenu connexe

En vedette

Block Truncation Coding
Block Truncation CodingBlock Truncation Coding
Block Truncation Codingriyagam
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisRamakant Soni
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 

En vedette (6)

Block Truncation Coding
Block Truncation CodingBlock Truncation Coding
Block Truncation Coding
 
Huffman Student
Huffman StudentHuffman Student
Huffman Student
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Source coding
Source codingSource coding
Source coding
 

Similaire à The Ethics of Predictive Coding

What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17Arthur Garcia
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
ACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMPatrickBilgere
 
DBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeDBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Ethical Challenges in the Development and Delivery of the Agtech Ecosystem
Ethical Challenges in the Development and Delivery of the Agtech EcosystemEthical Challenges in the Development and Delivery of the Agtech Ecosystem
Ethical Challenges in the Development and Delivery of the Agtech EcosystemTurlough Guerin GAICD FGIA
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallCardinaleWay Mazda
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachFinancial Poise
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformProcessMAP Corporation
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 

Similaire à The Ethics of Predictive Coding (20)

What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
ACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRM
 
DBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeDBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby Drake
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Guerin et al steeDA Conference 2019
Guerin et al   steeDA Conference 2019 Guerin et al   steeDA Conference 2019
Guerin et al steeDA Conference 2019
 
Ethical Challenges in the Development and Delivery of the Agtech Ecosystem
Ethical Challenges in the Development and Delivery of the Agtech EcosystemEthical Challenges in the Development and Delivery of the Agtech Ecosystem
Ethical Challenges in the Development and Delivery of the Agtech Ecosystem
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
LegalAI.pptx
LegalAI.pptxLegalAI.pptx
LegalAI.pptx
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platform
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 

Plus de Robbie Hilson

ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation Robbie Hilson
 
ACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastRobbie Hilson
 
Aceds presentation formatted final v2
Aceds presentation formatted final v2Aceds presentation formatted final v2
Aceds presentation formatted final v2Robbie Hilson
 
Ppt day in the life of a case manager final v 2
Ppt day in the life of a case manager    final v 2Ppt day in the life of a case manager    final v 2
Ppt day in the life of a case manager final v 2Robbie Hilson
 
Nuance-ACEDS May 21 OCR Webcast
Nuance-ACEDS May 21 OCR Webcast Nuance-ACEDS May 21 OCR Webcast
Nuance-ACEDS May 21 OCR Webcast Robbie Hilson
 
Slides from ACEDS-Xact Data Discovery 5-7-14 Webcast
Slides from ACEDS-Xact Data Discovery 5-7-14 WebcastSlides from ACEDS-Xact Data Discovery 5-7-14 Webcast
Slides from ACEDS-Xact Data Discovery 5-7-14 WebcastRobbie Hilson
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastRobbie Hilson
 

Plus de Robbie Hilson (7)

ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation
 
ACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 WebcastACEDS-TRU Staffing Partners 7-23-14 Webcast
ACEDS-TRU Staffing Partners 7-23-14 Webcast
 
Aceds presentation formatted final v2
Aceds presentation formatted final v2Aceds presentation formatted final v2
Aceds presentation formatted final v2
 
Ppt day in the life of a case manager final v 2
Ppt day in the life of a case manager    final v 2Ppt day in the life of a case manager    final v 2
Ppt day in the life of a case manager final v 2
 
Nuance-ACEDS May 21 OCR Webcast
Nuance-ACEDS May 21 OCR Webcast Nuance-ACEDS May 21 OCR Webcast
Nuance-ACEDS May 21 OCR Webcast
 
Slides from ACEDS-Xact Data Discovery 5-7-14 Webcast
Slides from ACEDS-Xact Data Discovery 5-7-14 WebcastSlides from ACEDS-Xact Data Discovery 5-7-14 Webcast
Slides from ACEDS-Xact Data Discovery 5-7-14 Webcast
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcast
 

The Ethics of Predictive Coding

  • 1. Recommind Proprietary & Confidential The Ethics of Predictive Coding Developing strategy, implementing tactics, and avoiding ethical traps
  • 2. ACEDS Membership Benefits Training, Resources and Networking for the E-Discovery Community Join Today! aceds.org/join Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More! “ACEDS provides an excellent, much needed forum to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 4. Recommind Proprietary & Confidential Speakers Philip Favro Senior Discovery Counsel Recommind, Inc. Gareth Evans Litigation Partner Gibson, Dunn & Crutcher Stacey Blaustein Corporate Litigation Counsel International Business Machines, Inc.
  • 5. Recommind Proprietary & Confidential 2 1 3 4 5 What is Predictive Coding? Strategy and Tactics Ethical Traps Defensibility Resources / Q & A Agenda
  • 6. Recommind Proprietary & Confidential • DOJ has sued Acme Corp. under the False Claims Act for $2.5 billion in damages • DOJ is seeking responsive ESI from a universe of 20 million Acme documents • Acme is looking at various options to expedite its production of responsive ESI to DOJ, including the use of predictive coding Hypothetical
  • 7. Recommind Proprietary & Confidential What is Predictive Coding?
  • 8. Recommind Proprietary & Confidential Judicial Definition of Predictive Coding “Under predictive coding, the software ‘learns’ a user's preferences or goals; as it learns, the software identifies with greater accuracy just which items the user wants, whether it be a song, a product, or a search topic.” In re Biomet, 2013 U.S. Dist. LEXIS 84440,*3 (N.D. Ind. Mar. 25, 2013)
  • 9. Recommind Proprietary & Confidential Another Court Definition of Predictive Coding “Through iterative learning, these methods (known as ‘computer-assisted’ or ‘predictive’ coding) allow humans to teach computers what documents are and are not responsive to a particular FOIA or discovery request and they can significantly increase the effectiveness and efficiency of searches. ” Nat'l Day Laborer Org. Network v. United States Immigration & Customs Enforcement Agency, 877 F. Supp. 2d 87, 109 (S.D.N.Y., 2012)
  • 10. Recommind Proprietary & Confidential Strategy and Tactics
  • 11. Recommind Proprietary & Confidential To Disclose or Not To Disclose? How many of you agree with the following statement? “Advise opposing counsel that you plan to use computer-assisted coding and seek agreement; if you cannot, consider whether to abandon predictive coding for that case or go to the court for advance approval.” Da Silva Moore v. Publicis Groupe, 287 F.R.D. 182, 184 (S.D.N.Y. 2013)
  • 12. Recommind Proprietary & Confidential • Will the training set be randomly selected, targeted, or a hybrid of both? • Will opposing counsel be allowed to help develop the training set? • How will you address the disclosure of non-responsive and privileged materials in the training set? How Will The “Seed Set” Be Handled?
  • 13. Recommind Proprietary & Confidential No Obligation to Disclose Non-Responsive Documents In re Biomet, 2013 U.S. Dist. LEXIS 172570, *3 (N.D. Ind. Aug. 21, 2013) “The Steering Committee wants the whole seed set Biomet used for the algorithm's initial training. That request reaches well beyond the scope of any permissible discovery by seeking irrelevant or privileged documents used to tell the algorithm what not to find.”
  • 14. Recommind Proprietary & Confidential Other Key Considerations • Will discovery be staged? • How to accurately determine prevalence? • Will clearly non-responsive ESI be removed before training the predictive coding tool? • What score assigned to a particular document will be the production cut-off point? • How are you handling privilege reviews? • What is your validation process?
  • 15. Recommind Proprietary & Confidential Ethical Traps
  • 16. Recommind Proprietary & Confidential • Safeguarding Work Product • Protecting Privileged Materials • Satisfying the Rule 26(g) Certification Common Ethics Traps Associated with Predictive Coding
  • 17. Recommind Proprietary & Confidential “The Steering Committee wants to know, not whether a document exists or where it is, but rather how Biomet used certain documents before disclosing them. Rule 26(b)(1) doesn't make such information disclosable. The only authority the Steering Committee cites is a report of the Sedona Conference . . .” No Obligation to Disclose Opinion Work Product In re Biomet, 2013 U.S. Dist. LEXIS 172570, *4 (N.D. Ind. Aug. 21, 2013)
  • 18. Recommind Proprietary & Confidential • Should privileged materials be culled from the universe of potentially responsive ESI? • How can the privilege be protected if a negotiated protocol requires privileged materials be included in the seed set? • What search methods and quality control measures are in place to identify privileged materials before production? • Is there a Rule 502(d) order in place? Implementing Privilege Safeguards in the Review Process
  • 19. Recommind Proprietary & Confidential • Must you disclose the use of predictive coding and/or enter into a stipulated protocol to comply with Rule 26(g)(1)(B)? • If you fail to do so, could you be precluded from using predictive coding? Satisfying the Rule 26(g) Reasonable Inquiry Standard Progressive v. Delaney, 2014 U.S. Dist. LEXIS 69166 (D. Nev. May 19, 2014)
  • 20. Recommind Proprietary & Confidential Defensibility
  • 21. Recommind Proprietary & Confidential • Have a well-documented process • Demonstrate that the process is reasonable; perfection not required • Consider whether to disclose PC use; agreements on front-end might be beneficial, but could still be problematic Defending the Process
  • 22. Recommind Proprietary & Confidential Resources / Q & A
  • 23. Recommind Proprietary & Confidential Resources Hon. Patrick J. Walsh, Rethinking Civil Litigation in Federal District Court, 40 LITIG. 6, 7 (2013) Dana A. Remus, The Uncertain Promise of Predictive Coding, 99 Iowa L. Rev. 1691 (2014)
  • 24. Recommind Proprietary & Confidential RESOURCES http://www.recommind.com/mind-over-matters
  • 25. Recommind Proprietary & Confidential 25 Q & A
  • 26. Recommind Proprietary & Confidential 26 Thank you!! Philip J. Favro Senior Discovery Counsel phil.favro@recommind.com (650) 714-9134