Embodiments described herein relate to use of computer software which generates legal notices and workflows based on predefined templates.
Corporate legal departments typically face a substantial volume of litigation. Discovery refers to a pre-trial phase of the litigation process where parties exchange information related to the civil action. In recent years, the proliferation of technology has allowed for the exchange of information, such as documents, electronically. The term “eDiscovery” has been adopted to refer to the electronic discovery process. The discovery process, electronic or otherwise, requires attorneys, paralegals, and support staff in legal departments to track and respond to a significant number of different matters. The discovery process was traditionally managed by individuals who maintained and updated spreadsheets and emails to track key items and events in the discovery process. This management system resulted in high overhead, poor quality, significant mistakes, and untenable risk. The adoption of eDiscovery has made these methods of management unsustainable, resulting in a number of software applications designed to automate the discovery process.
Discovery is a critical component of most civil actions. As part of the discovery process, parties to the action serve upon the opposition a discovery request, which identifies a number of items sought to be discovered. Current discovery rules permit discovery through a number of methods, including, but not limited to, requests for answers to interrogatories, requests for production of documents, requests for admissions, and depositions. For example, an employee-plaintiff in a wrongful termination lawsuit may serve a request for production of documents on an employer-defendant, seeking all documents related to the firing of the employee, which forms the basis of the employee's cause of action against the employer. Upon receiving the request, the legal department of the corporation is under an obligation to identify and preserve any documents, such as emails, related to the firing of the employee, such that they may be duplicated and returned to the employee-plaintiff. When the items requested are in digital format, eDiscovery rules apply, such that the employer-defendant must preserve the documents and provide them in a digital format. In some instances, a non-party may be served a discovery request if it possesses information relevant to the lawsuit. The number of documents subject to the discovery request may count in the hundreds, thousands, millions, or more, and may be possessed by numerous individuals in multiple different formats across any number of computers in any number of different jurisdictions.
In response to the discovery request, members of the legal department must place all documents subject to the discovery request, identified or unidentified, under a legal hold. The first step in the legal hold process is the transmission of a hold notice to all custodians who may possess the documents. The hold notice will typically indicate the relevant documents subject to the hold, and direct the custodians to preserve any document which may be relevant to the action to prevent spoliation. Spoliation is the intentional or negligent withholding, hiding, altering, or destroying of evidence relevant to a legal proceeding. If, for example, the corporation has a policy under which documents (electronic or paper) are destroyed on a periodic interval, the hold notice will direct the custodians to suspend the policy as to the documents subject to the legal hold. Although hold notices may be sent in response to discovery requests, corporations are under a preservation obligation in numerous settings. The preservation obligation generally extends to all forms of relevant information when litigation (including government audits, regulatory proceedings, etc.) is reasonably anticipated. Litigation, or any of its analogs, need not be current or pending in order to trigger the duty to preserve relevant evidence. A hold notice would be necessary in any of these situations to prevent the spoliation of evidence.
A hold notice typically must be drafted by an attorney for the corporation who incorporates all relevant information into the notice. The notice must be individually tailored for each specific legal matter, resulting in a time consuming process for legal department staff. A hold notice may take any number of forms depending on the phase of the preservation. Some examples include, but are not limited to, an initial hold notice, a change notice, and reminder notices. An initial hold notice is generated when a notice is initially published by the legal department of the corporation, and informs the custodians of the preservation obligation. A change notice is generated in order to notify recipients of initial hold notices or previous change notices that terms of the legal hold have changed. For example, the legal hold may be expanded or contracted to cover a larger or smaller number of documents as the litigation process evolves. Reminder notices are communicated on a periodic to remind custodians of their legal obligations.
A legal notice, such as a hold notice, change notice, or reminder notice, is accompanied by a number of policies related to the lifecycle of the legal notice. For example, a legal department may monitor receipt, acceptance, and compliance with the notice, and provide a number of escalation methods for addressing noncompliance with the terms of the notice. To monitor the lifecycle of legal notices, legal departments define a number of workflows to handle all aspects of the legal notice, which include, but are not limited to, policies related to the creation, transmission, and monitoring of the legal notice.
Companies typically have a handful of attorneys creating legal notice templates and reviewing workflow processes designed to enforce some level of consistency and compliance with the legal notice. Companies today would benefit greatly from a repeatable, defensible, and standardized process around the creation and management of legal notices to maximize efficiency, reliability, and effectiveness. Due to the increased amount of litigation and complexity of legal holds, the creation of flexible notices would be beneficial. For example, hold notices can be configured to provide tiered escalation workflows, responsive to noncompliance or unresponsiveness to the legal notice, which can be configured differently for people in different positions, organizations, jurisdictions, etc.
In addition, due to the increased complexity of an eDiscovery notice lifecycle and the dynamic nature of a notice's contents, a simple process to review notices and providing basic content templates for generation of legal notices becomes inadequate in terms of being repeatable, defensible, and scalable, and fails to produce quality notices with any level of consistency.
Embodiments described herein provide a method, system, and computer program product for creating legal notices in a matter in an electronic discovery management system by, providing a plurality of content templates for a legal notice, the content templates each comprising at least one attribute of the legal notice, wherein each content template is specific to a type of matter in the electronic discovery management system, providing a plurality of processing rule templates, each processing rule template comprising at least one processing rule, wherein the at least one processing rule defines rules and workflows related to at least one of the: (i) creation, (ii) transmission, and (iii) monitoring of the legal notice; wherein combinations of the processing rule templates and the content templates is used to generate legal notices and, responsive to receiving selection of a first content template and a first processing rule template, generating, by operation of one or more computer processors, a legal notice and workflows based on the first content template and the first processing rule template.
So that the manner in which the above recited aspects are attained and can be understood in detail, a more particular description of embodiments of the invention, briefly summarized above, may be had by reference to the appended drawings.
It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
Embodiments described herein provide a method, system, and computer program product for creating legal notices and workflows based on predefined templates. A plurality of content templates for a legal notice is provided, the content templates comprising at least one attribute related to the legal matter. A plurality of processing rule templates for a legal notice is provided, the processing rule templates comprising at least one processing rule defining rules and workflows surrounding the legal notice. Responsive to receiving selection of a content template and a processing rule template, a legal notice and workflows are generated based on the selected content template and the selected processing rule template.
In the following, reference is made to embodiments of the disclosure. However, it should be understood that the disclosure is not limited to specific described embodiments. Instead, any combination of the following features and elements, whether related to different embodiments or not, is contemplated to implement and practice the disclosure. Furthermore, although embodiments may achieve advantages over other possible solutions and/or over the prior art, whether or not a particular advantage is achieved by a given embodiment is not limiting of the disclosure. Thus, the following aspects, features, embodiments and advantages are merely illustrative and are not considered elements or limitations of the appended claims except where explicitly recited in a claim(s). Likewise, reference to “the invention” shall not be construed as a generalization of any inventive subject matter disclosed herein and shall not be considered to be an element or limitation of the appended claims except where explicitly recited in a claim(s).
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or computer program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of embodiments disclosed herein may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present disclosure are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments disclosed herein. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Embodiments described herein may be provided to end users through a cloud computing infrastructure. Cloud computing generally refers to the provision of scalable computing resources as a service over a network. More formally, cloud computing may be defined as a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Thus, cloud computing allows a user to access virtual computing resources (e.g., storage, data, applications, and even complete virtualized computing systems) in “the cloud,” without regard for the underlying physical systems (or locations of those systems) used to provide the computing resources.
Typically, cloud computing resources are provided to a user on a pay-per-use basis, where users are charged only for the computing resources actually used (e.g. an amount of storage space consumed by a user or a number of virtualized systems instantiated by the user). A user can access any of the resources that reside in the cloud at any time, and from anywhere across the Internet. In context of the present disclosure, a user may access applications for generating legal notices or related data available in the cloud. For example, the application could execute on a computing system in the cloud and create legal notices. In such a case, the application could generate legal notices based on predefined templates and store the legal notices at a storage location in the cloud. Doing so allows a user to access this information from any computing system attached to a network connected to the cloud (e.g., the Internet).
The computer 102 generally includes a processor 104 connected via a bus 112 to a memory 106, a network interface device 110, a storage 108, an input device 114, and an output device 116. The computer 102 is generally under the control of any commercially available or open source operating system 118 supporting the functions disclosed herein. The processor 104 is included to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, and the like. Similarly, the memory 106 may be a random access memory. While the memory 106 is shown as a single entity, it should be understood that the memory 106 may comprise a plurality of modules, and that the memory 106 may exist at multiple levels, from high speed registers and caches to lower speed but larger DRAM chips. The network interface device 110 may be any type of network communications device allowing the computer 102 to communicate with other computers via the network 130.
The storage 108 may be a hard disk drive storage device. Although the storage 108 is shown as a single unit, the storage 108 may be a combination of fixed and/or removable storage devices, such as fixed disc drives, removable memory cards, optical storage, flash memory or solid state storage devices (SSD). The memory 106 and the storage 108 may be part of one virtual address space spanning multiple primary and secondary storage devices.
The input device 114 may be any device for providing input to the computer 102. For example, a keyboard, keypad, light pen, touch-screen, track-ball, or speech recognition unit, audio/video player, and the like may be used. The output device 116 may be any device for providing output to a user of the computer 102. For example, the output device 116 may be any conventional display screen or set of speakers, along with their respective interface cards, i.e., video cards and sound cards. Although shown separately from the input device 114, the output device 116 and input device 114 may be combined. For example, a display screen with an integrated touch-screen, a display with an integrated keyboard, or a speech recognition unit combined with a text speech converter may be used.
As shown, the memory 106 contains eDiscovery application 120. The eDiscovery application 120 is a general purpose eDiscovery management application used to manage all aspects of the eDiscovery process. In some embodiments, eDiscovery application 120 provides a method to store and track information related to legal matters within an organization. In some embodiments, eDiscovery application 120 defines workflows for each of the processes within a legal matter, provides mechanisms to issue notices and alerts related to steps in the workflow, and methods to track progress of items within the workflow. In some embodiments, eDiscovery application 120 automates communication of discovery requirements and facts between legal staff and custodians with automatic action item assignments, notifications, alerts, work planning and views of holds and collections. One example of an eDiscovery management application is IBM® Atlas eDiscovery Process Management. (IBM is a trademark of International Business Machines Corporation, registered in many jurisdictions worldwide.)
As shown, the memory 106 also contains notice manager 122. In some embodiments, the notice manager 122 is an application configured to generate legal notice documents and workflows surrounding management of their lifecycle by receiving user selection of a predefined content template and a predefined rule template. A content template, in the context of the present disclosure, encapsulates the majority of the language found in a legal notice. A processing rule template, in the context of the present disclosure, provides processing rules used to define workflows surrounding the management of the lifecycle of the legal notice. In some embodiments, the notice manager 122 is a component of eDiscovery application 120, such that the functionality of notice manager 122 is performed by modules of eDiscovery application 120.
As shown, the storage 108 contains template repository 124. The template repository 124, although depicted as a database in
As stated above, the content template 132 encapsulates the majority of the language found in a legal notice. The content template 132 may be specific to a type of legal matter, such as intellectual property, employment, or real property, or may span across multiple types of matters handled by a legal department. Furthermore, the content template 132 may be specific to a stage of the eDiscovery process, such as anticipation of litigation, commencement of litigation, receipt of a discovery request, etc. Alternatively, the content template 132 may also be defined broadly enough to cover all stages of the eDiscovery process. In some embodiments, the information in the content template 132 may include, but is not limited to, a unique name for the content template 132, a description of the content template 132 (i.e., the type of legal matter the content template 132 should be used for), a corporate header to be included in the legal notice, the main contents of the notice (which may contain the legal verbiage related to the legal notice), any attachments to be included to support the legal notice (e.g., documents, images, spreadsheets), and the author of the content template 132. The content template 132, and all content templates generally, are drafted by a user, usually an attorney, and saved to the template repository 124 for future use by others in the organization.
The processing rule template 134 contains configuration elements associated with the lifecycle of the legal notice. Depending on the business process adopted by a legal organization, creators of the processing rule template 134 may choose to lock individual elements of the notice, such that their inclusion is mandatory in all instances of legal notices created using the processing rule template 134. A “locked” configuration element cannot be modified when a legal notice is being created. The processing rule template 134 may be specific to a type of legal notice, such as an initial hold notice, a change notice, or a reminder notice. The configuration elements of the processing rule template 134, and all processing rule templates generally, are defined by a user, usually an attorney, who decides which elements to include in the template, and whether those elements should be locked. The user, upon defining the configuration elements of the processing rule template 134, then saves the processing rule template 134 to the template repository 124. The configuration elements of the processing rule template 134 may include, but are not limited to:
(a) A subject to be used in email communications.
(b) A notice header, which, along with the corporate header in the content template, is specific for a particular type of notice (e.g., initial hold notice, change notice, reminder notice).
(c) Confirmation requirement. The confirmation requirement, if selected, triggers a confirmation workflow in order to receive confirmation of delivery of the notice to a custodian. The confirmation requirement is “lockable.”
(d) Confirmation instructions. Describes the confirmation procedures used to obtain confirmation from the custodian. In some embodiments, this may be an email from the custodian, a link the custodian clicks to confirm delivery, or any number of methods to receive confirmation. Confirmation instructions are “lockable.”
(e) Virtual interview. Specifies that a virtual interview can be used to confirm receipt of a notice by a custodian. Virtual interview selection is “lockable.”
(f) Virtual interview questionnaire. Specifies an approved confirmation virtual interview questionnaire from a library of questionnaires. The virtual interview questionnaire is “lockable.”
(g) Escalation rules. Enables a multi-tiered escalation workflow due to the lack of a response from the custodian. In some embodiments, the escalation workflow is triggered in response to a lack of confirmation. In other embodiments, the escalation workflow is triggered in response to a lack of compliance with the hold notice. In still other embodiments, the escalation workflow is triggered in response to Escalation rules are “lockable.”
(h) Escalation tier. Specifies a tier of escalation based on the number of missed deadlines. A single tier may also be implemented. The principle behind the escalation tiers is that multiple tiers can be provided to address missed deadlines in an increasingly aggressive manner to ensure compliance.
(i) Number of missed deadlines. Specifies the number of missed deadlines for which the escalation rule is applicable. For example, escalation tier 1 can be defined to apply for the first three missed deadlines, and escalation tier 2 may be for all subsequent missed deadlines.
For each escalation tier, the following elements can also be configured:
(i) Send confirmation reminder. Forces the transmission of a confirmation reminder email for the escalation rule.
(ii) Subject of the confirmation reminder email.
(iii) Confirmation reminder header. Free text content along with variables from the confirmation email, including the corporate header, footer, and main body.
(iv) Escalate to manager. Whether to enable a manager escalation workflow upon lack of response to notice.
(v) Escalate to manager subject. The subject of an email sent to the manager of a custodian who has not confirmed receipt of the notice.
(vi) Escalation template. Selected from a pre-defined set of escalation email templates.
(vii) Include initial notice. Indicate whether to include the contents of the initial notice in the confirmation reminder.
(viii) Generate alert. Whether to alert legal staff assigned to the matter of the triggering of an escalation workflow.
By defining different rules for each notice, as well as identifying the roles a custodian plays in an organization, different notice workflows may be defined accordingly. For example, escalation workflows surrounding a legal notice sent to a corporate executive may permit for a greater number of missed deadlines before sending a reminder notice to the executive. Workflows surrounding the same legal notice sent to a lower level employee-custodian may permit for a lesser number of missed deadlines before sending a reminder notice to the custodian.
As shown, the storage 108 also contains eDiscovery data 126. The eDiscovery data 126 is data stored by the eDiscovery application 120, and includes information related to legal matters managed by the eDiscovery application 120. The types of data stored in eDiscovery data 126 include, but are not limited to, documents, legal notices, information related to the legal matter, custodian information, and deadline dates. The eDiscovery data 126, although depicted as a database in
As stated above, a processing rule template is used to define rules for a plurality of notices, including without limitation, an initial notice, a change notice, and a reminder notice. Element 303 of the exemplary processing rule template 300 contains rules related to the creation of an initial notice. As shown, subject element 318 indicates that the exemplary processing rule template 300 is an initial hold notice. The confirmation required element 320 indicates that a recipient of the notice must provide confirmation of receipt within 3 days of receiving the notice. Table 322 defines a plurality of escalation rules 324, 326, and 328, corresponding to three tiers of escalation rules. Any number of tiers may be implemented. Usage element 330 indicates that escalation rule 324 is to be used after the first two missed deadlines, escalation rule 326 is to be used after the next two deadlines, and escalation rule 238 is to be used after all subsequent deadlines. Send confirmation reminder element 332 indicates that the transmission of an additional reminder requesting confirmation that the notice has been received is not required in escalation rule 324, but is required for escalation rules 326 and 328. Confirmation reminder subject element 334 indicates the subject of an email confirmation reminder to be sent at each tier of escalation rule. Escalate to manager element 336 indicates whether the manager of an intended recipient who has not confirmed receipt of the notice should be notified of the failure to confirm receipt. Escalation template element 338 includes the content of the notice sent to manager of a person who failed to respond. Generate non-response alert element 340 indicates whether an alert should be generated if a response is not received at each escalation tier. Attached files element 342 indicates that a file has been attached to the exemplary processing rule template 300, and will be included with any initial notice generated using the exemplary processing rule template 300.
Element 305 specifies the processing rules related to a change notice generated using the exemplary processing rule template 300. Element 344 specifies the subject of an email sent to a custodian, in this example, “Action required: Terms of the hold notice have changed, please confirm.” Confirmation required element 346 indicates that a recipient must confirm receipt within 3 days of receiving the change notice. Confirmation instructions 348, escalation rules 350, and attachments 352, although they may be specified independently, have each been set to be the same as the initial notice, as described above.
Element 307 specifies the processing rules related to an auto-reminder sent using the exemplary processing rule template 300. The subject element 354 indicates the subject of an email including the auto-reminder. Confirmation required element 356 indicates that a recipient must confirm receipt within 3 days of receiving the auto-reminder. Grace period 358 indicates that a grace period of 15 days will be provided to recipients before further action is taken by the eDiscovery application 120. Table 360 is a set of escalation rules, which in this example contains two tiers, escalation rule 362 and escalation rule 364. Usage element 366 indicates that escalation rule 362 is to be used after the first missed deadline, and that escalation rule 364 is to be used after all subsequent missed deadlines. Send confirmation reminder element 368 indicates that the transmission of an additional reminder requesting confirmation that the notice has been received is not required in escalation rule 362, but is required for escalation rule 364. Confirmation reminder subject element 370 indicates the subject of a confirmation reminder to be sent at each tier of escalation rule. Escalate to manager element 372 indicates whether the manager of an intended recipient who has not confirmed receipt of the notice should be notified of the failure to confirm receipt. Escalation template element 374 includes the content of a notice sent to the manager of the recipient who did not respond. Generate non-response alert element 376 indicates whether an alert should be generated if a response is not received at each escalation tier.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Using content templates and processing rule templates, legal organizations are able to establish repeatable, defensible, and consistent processes around legal notices. Authorized users within the legal organization author and manage a repository of the content templates used for a variety of legal matters, such as intellectual property, employment law, mortgages, etc. Since rules can vary depending on the role, organization, and geographical location of the custodian, processing rule templates can also be established targeting various categories of custodians. For example, separate rules could be established for custodians who are corporate executives as compared to rules established for non-executives in the corporation. By using content templates and processing rule templates, legal organizations are able to establish a process whereby a large number of users with limited legal training and skills can create legal notices that is simple, efficient, reliable, and compliant with polices, regulations, rules, and laws.
While the foregoing is directed to embodiments of the present disclosure, other and further embodiments of the disclosure may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.