<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>edisclosure myth or reality? &#187; Process</title>
	<atom:link href="https://jollyvip.com/edisclosure/category/process/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/edisclosure</link>
	<description>From litigation to the arbitration regime</description>
	<lastBuildDate>Tue, 01 Jul 2025 10:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>Contact Tracing</title>
		<link>https://jollyvip.com/edisclosure/2020/05/27/contact-tracing/</link>
		<comments>https://jollyvip.com/edisclosure/2020/05/27/contact-tracing/#comments</comments>
		<pubDate>Wed, 27 May 2020 19:43:49 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[DPIA PIA]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=981</guid>
		<description><![CDATA[A long time ago I was involved in assessing and using contact tracking solutions. It was during the Kosovo War (1998-1999) and I was working with an international charity organisation. At that time, I have not heard of Data Protection or privacy or Human Rights and did not have any safety procedures or standards to [...]]]></description>
			<content:encoded><![CDATA[<p>A long time ago I was involved in assessing and using contact tracking solutions. It was during the Kosovo War (1998-1999) and I was working with an international charity organisation. At that time, I have not heard of Data Protection or privacy or Human Rights and did not have any safety procedures or standards to follow. </p>
<p>Did I do any impact assessments? I probably did but nothing related to data protection or privacy. Did the solution cause any harm to anyone? I don&#8217;t think so. However, I remembered I spent a fair amount of time reflecting on the users of the tracing systems. The main users were those affected /impacted by the War and the administrators of the systems. Would any Data Protection Impact Assessments (DPIAs) and Privacy Impact Assessments (PIAs) method help me back in 1998?</p>
<p>As part of my PhD, I examined various DPIAs and PIAs and I can say I’m not any wiser in using those impact assessments method except that now I am aware of Data Protection, data privacy and Human Rights.</p>
<p>Right now, I’m reflecting on the contact tracing app after reading the <a href="https://bit.ly/2zBt2BY" title="The NHS Contact Tracing App: 11 key talking points" target="_blank">article – The NHS Contact Tracing App: 11 key talking points –published by the BCS</a>. I wonder whether any of the DPIAs or PIAs method has been used by the app designers. I suspect not. </p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2020/05/27/contact-tracing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Idiot&#8217;s Guide or Dummies Book</title>
		<link>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/</link>
		<comments>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/#comments</comments>
		<pubDate>Wed, 03 Oct 2012 06:12:04 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Books]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[book]]></category>
		<category><![CDATA[predictive coding]]></category>
		<category><![CDATA[symantec]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=422</guid>
		<description><![CDATA[The most difficult aspect of edisc(overy)/(losure) is writing a definitive, complete book covering all the elements of edisc that satisfies everyone or is suitable for general release. So, will a Dummies Guide or an Idiot’s Guide to edisc make it to this year Xmas book list? Perhaps an unlikely Xmas event. What has been stated [...]]]></description>
			<content:encoded><![CDATA[<p>The most difficult aspect of edisc(overy)/(losure) is writing a definitive, complete book covering all the elements of edisc that satisfies everyone or is suitable for general release. So, will a Dummies Guide or an Idiot’s Guide to edisc make it to this year Xmas book list? Perhaps an unlikely Xmas event.</p>
<p>What has been stated is that the review process is the most expansive aspect of edisc (i.e. expansive labor and time and voluminous document). So much so that predictive coding is now not only a tool used for the review process but also has become a topic of its own in the US courts.  Is the review process also the most difficult of the edisc process?  If you answer ‘yes’ or ‘no’, why do we need predictive coding?<br />
Perhaps some answers (hopefully with relevant questions raised too) will appear in the new book <a href="https://symantecevents.verite.com/tpc " title="Predictive Coding for Dummies book - symantec" target="_blank">Predictive Coding for Dummies book.</a></p>
<p>I wonder why there are no Dummies or Idiot’s Guide to the review process, instead one on predictive coding. I guess it is easier to write about a piece of tool/technique and not too easy to write on the review process or not profitable enough to do so.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>why five principles?</title>
		<link>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/</link>
		<comments>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/#comments</comments>
		<pubDate>Wed, 31 Aug 2011 23:51:30 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[collusion of]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[lexology]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Privacy by Design]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=256</guid>
		<description><![CDATA[I have not done a search for the original article or press statements on &#8216;the Commission’s concept for the future EU data privacy framework&#8217; as mentioned in Development and revision of global data privacy and security laws on lexology. Why five principles? This principle &#8211; Privacy by design -  sounds great with the 3 words [...]]]></description>
			<content:encoded><![CDATA[<p>I have not done a search for the original article or press statements on &#8216;the Commission’s concept for the future EU data privacy framework&#8217; as mentioned in <a title="Development and revision of global data privacy and security laws" href="http://www.lexology.com/library/detail.aspx?g=6c73a0f9-574b-482c-9a65-ab98ce9fff9b" target="_blank">Development and revision of global data privacy and security laws</a><br />
on lexology.</p>
<p>Why five principles?</p>
<p>This principle &#8211; <strong>Privacy by design</strong> -  sounds great with the 3 words title which is rather arty and catchy like a company&#8217;s business motto.</p>
<p>The description &#8211; &#8216;<em><strong>New</strong></em> <strong><em>technical</em></strong> developments have to observe data privacy requirements at  an <em><strong>early development stage</strong></em>, thus permitting the introduction of data  protecting hardware and software&#8217;.</p>
<p>Only &#8216;new&#8217; technical developments and at an &#8216;early&#8217; development stage?</p>
<p>Just another play with words for my own amusement.</p>
<p>In terms of designing hardware and software for data privacy and/or protection, the play with words will not help software folks.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>e-discovery process in SoLoMo</title>
		<link>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/</link>
		<comments>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/#comments</comments>
		<pubDate>Wed, 22 Jun 2011 17:45:52 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[ServiceProviders]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[SoLoMo]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=246</guid>
		<description><![CDATA[The new order of data -  SoLoMo for social, local, mobile data. Now this is what I call  &#8216;ediscovery rhyme&#8217; ! Does this mean that Cloud Computing is now passé? To quote Paknad in the news at law.com: &#8220;There&#8217;s no easy button, there&#8217;s just complex and more complex buttons.&#8221; Complex buttons leading to more sore [...]]]></description>
			<content:encoded><![CDATA[<p>The new order of data -  SoLoMo for social, local, mobile data. Now this is what I call  &#8216;ediscovery rhyme&#8217; !</p>
<p>Does this mean that Cloud Computing is now passé?</p>
<p>To quote Paknad in the news at<a title="Font Size: increase font decrease font IBM Escalates E-Discovery Arms Race" href="http://bit.ly/mSO0Hh" target="_blank"> law.com</a>: &#8220;There&#8217;s no easy button, there&#8217;s just complex and more complex buttons.&#8221;</p>
<p>Complex buttons leading to more sore fingers and eyes ( even with predictive coding! ).</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The ‘problem’ being ‘non-issue’ or ‘the issue’ or a ‘multi-million dollar issue’</title>
		<link>https://jollyvip.com/edisclosure/2010/10/07/the-problem-being-non-issue-or-the-issue-or-a-multi-million-dollar-issue/</link>
		<comments>https://jollyvip.com/edisclosure/2010/10/07/the-problem-being-non-issue-or-the-issue-or-a-multi-million-dollar-issue/#comments</comments>
		<pubDate>Thu, 07 Oct 2010 10:06:35 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[individuals]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[IP]]></category>
		<category><![CDATA[problem solving]]></category>
		<category><![CDATA[questions]]></category>

		<guid isPermaLink="false">http://iedisc.com/2010/10/07/the-%e2%80%98problem%e2%80%99-being-%e2%80%98non-issue%e2%80%99-or-%e2%80%98the-issue%e2%80%99-or-a-%e2%80%98multi-million-dollar-issue%e2%80%99/</guid>
		<description><![CDATA[The opening statements from eDiscovery Advice from A Fellow Traveller; I am not an eDiscovery expert, and I am not selling eDiscovery services. This post is for the masses not the specialist. It is from one fellow traveller to another fellow traveller. Mmm… I guess the specialist will also read it, perhaps more drawn to [...]]]></description>
			<content:encoded><![CDATA[<p>The opening statements from <a href="http://lnk.co/GEM5T">eDiscovery Advice from A Fellow Traveller</a>;<br />
<strong>I am not an eDiscovery expert, and I am not selling eDiscovery services.<br />
This post is for the masses not the specialist.  It is from one fellow traveller to another fellow traveller. </strong></p>
<p>Mmm… I guess the specialist will also read it, perhaps more drawn to the ‘multi-million dollar’ problem. There are still IT folks, even IT security folks (from my own recent exposure at a recent gathering) who are not aware of ediscovery and they are ‘specialist&#8217; in their own fields and in terms of ediscovery they are amongst the ‘masses’.</p>
<p>From another fellow traveller to others, I feel that the ediscovery space has been over-sold or over-rated or even over-exaggerated by (ediscovery) specialists on the few multi-million dollar cases. What about those cases where ediscovery were also ‘the issue’? For me, I certainly would relish more facts or stories from cases whereby ediscovery is a ‘non-issue’. These stories may not be ‘hot hot’ for the press or the masses but from a problem solving angle, it may reveal stuff which even the specialist have not thought about.</p>
<p>For me, ediscovery is about solving problems or involve problem solving. Even in simple problem, there will be questions and answers. So even if ediscovery is a ‘non-issue’ (a simple problem?) what is/are the problem(s), questions and answers?</p>
<p>I guess asking questions or more constructively, knowing what questions to ask and who is/are around or available to ask are ‘issues’ in ediscovery. Hence, I like the post by Dave Healey, with lots of questions.</p>
<p><strong>Finally, put someone you trust, who is diligent, and who is on the case, in charge of eDiscovery, and task them to actively monitor the process on a daily basis!</strong></p>
<p>Who? – another issue in ediscovery!</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2010/10/07/the-problem-being-non-issue-or-the-issue-or-a-multi-million-dollar-issue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A reckoning with reality</title>
		<link>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/</link>
		<comments>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/#comments</comments>
		<pubDate>Mon, 26 Apr 2010 19:03:44 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[data categories]]></category>
		<category><![CDATA[seal]]></category>
		<category><![CDATA[stamp]]></category>

		<guid isPermaLink="false">http://iedisc.com/2010/04/26/a-reckoning-with-reality/</guid>
		<description><![CDATA[Is there such a thing as ‘reality’? I guess the answer depends on where one draws a line or whether a line can indeed be distinguished and/or drawn. Can we really distinguish and be able to categorise data into neat buckets (or cells, columns, rows, stacks etc.)? Answer depends on who is distinguishing the data [...]]]></description>
			<content:encoded><![CDATA[<p>Is there such a thing as ‘reality’? I guess the answer depends on where one draws a line or whether a line can indeed be distinguished and/or drawn.</p>
<p>Can we really distinguish and be able to categorise data into neat buckets (or cells, columns, rows, stacks etc.)?  Answer depends on who is distinguishing the data and what the data represent for who. Lots of ‘who’ when it comes to dealing with the reality of data…</p>
<p>This blog was triggered after reading the article, <a href="http://iedisc.com/2010/04/26/a-reckoning-with-reality/the-fog-over-the-grimpen-mire-cloud-computing-and-the-law/" rel="attachment wp-att-204" title="The Fog over the Grimpen Mire: Cloud Computing and the Law">The Fog over the Grimpen Mire: Cloud Computing and the Law</a>, and the recent volcanic ashes quadmire affecting not only the travel industry but also announcement from the <a href="http://iccwbo.org/policy/banking/index.html?id=36095">ICC</a> on the non- force majeure of the rules of UCP 600 (article 36), URDG 458 (article 13) and URC 522 (article 15), I can’t help but wonder why documents are still needed.  No wonder my online banking is never really ‘instant’ when it comes to international payment/transaction – electrons travel but not the paper/document ‘money’. Is ‘money’ real or an illusion? The ‘bucks’ have to stop somewhere and it seems paper is still king in the digital age.</p>
<p>Recently, I was fortunate to have the chance to spend a brief period in the <a href="http://www.cietac.org/">CIETAC</a> office in Beijing and have my first taste of Chinese arbitration-mediation hearing and the administrative work done by the excellent staff in the CIETAC, Beijing.  Paper documentation dominants the way the Chinese conduct businesses and invariably paper document finds their way into the dispute resolution mechanism. I am told that the important stuff with document is the red stamp or the seal that shows or authenticate or prove that a piece of document is ‘real’. The seal representing a symbolic proof that the business or transaction is genuine and/or the document has been approved by some high authority or power. In essence the seal is a physical mark – like a signature and yet not quite like a signature more like a symbol recognisable by those who know where the line crosses i.e. the power to draw the line.</p>
<p>Perhaps the Service Level Agreements or the detailed contractual clauses serve as a reminder that the ‘bucks’ have to stop somewhere. The &#8216;somewhere&#8217; is non categorisable as the ‘act of god’ means different things to different people.  Is that why no one really read into the fine print (except those that wrote them?) until the ‘act of god’ becomes a reality to be reckoned with – like in the volcanic ash events?</p>
<p>In my previous work as analyst (system and business) whereby I have to categorise data or model data to fit into a particular business domain or process, I wish I have the luxury to be able to formulate the neat category as described in the article, The Fog over the Grimpen Mire: Cloud Computing and the Law. The author described an approach to the Easter egg business as:<br />
“<em>A cloud computing service that processes data for a small business will have access to four different types of data. First, there is data about the small business’ own customers. For example, the data for an Easter egg business might include a list of past Easter egg purchasers, and information about their purchases. Second there is account data about the small business itself, including its contact and payment details.<br />
Third is data generated by the operation of the services (some of which, for example the internal state of applications, may not be accessible to the small business). Last there is activity data, which tracks when and for which applications the business’ account with the service provider is used.</em>”</p>
<p>What I find interesting is whether such approach to data categorisation can be extended to any business, not only small business. In the context of cloud computing, the law is applicable not only to small business.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Hob nobbing, guanxi and not hot tubbing</title>
		<link>https://jollyvip.com/edisclosure/2009/05/24/hob-nobbing-guanxi-and-not-hot-tubbing/</link>
		<comments>https://jollyvip.com/edisclosure/2009/05/24/hob-nobbing-guanxi-and-not-hot-tubbing/#comments</comments>
		<pubDate>Sun, 24 May 2009 03:27:08 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2009]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Guanxi]]></category>
		<category><![CDATA[IBA]]></category>
		<category><![CDATA[JurisConference]]></category>
		<category><![CDATA[New York City]]></category>
		<category><![CDATA[The Hague]]></category>
		<category><![CDATA[Today's China]]></category>
		<category><![CDATA[weighing the facts]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/05/24/hob-nobbing-guanxi-and-not-hot-tubbing/</guid>
		<description><![CDATA[Recently, I was at two events (ADR related) and both required me to note my carbon footprint. My first event was ‘Resolving Business Disputes in Today’s China’ in New York City (organised by the JurisConference). It was a great event, great lunch and interesting lunch debate. Although the event has nothing to do with edisclosure/ediscovery, [...]]]></description>
			<content:encoded><![CDATA[<p>Recently, I was at two events (ADR related) and both required me to note my carbon footprint.</p>
<p>My first event was ‘Resolving Business Disputes in Today’s China’ in New York City (organised by the <a href="http://linkbee.com/459Q" target="_blank">JurisConference</a>). It was a great event, great lunch and interesting lunch debate. Although the event has nothing to do with edisclosure/ediscovery, one of the speaker/panellist did say ‘we avoid ediscovery’. Maybe resolving disputes in today’s China are being viewed as ‘resolving disputes being the same as doing businesses’. Doing businesses in these parts of the world are still steep in the traditional ways of using and/or maintaining ‘face’ or ‘<a href="http://en.wikipedia.org/wiki/Guanxi" target="_blank">guanxi</a>’. If you have guanxi, then ethical (like arbitrator’s biases or impartiality or independence) or trust issues just do not surface or are naturally imposed in the guanxi relationships. (Hence, Med-Arb is a natural way for resolving disputes in the Far East).</p>
<p>However, there’s more than one party in a dispute and if one of them is not accustomed to guanxi then the game of ‘where to go or which seat or which institution or who has the leverage/assets/ power to turn the table?’ provides the dispute drama. The game is not whether we can find the evidence or whether we need the evidence. It is not a ‘truth seeking’ game. Is that why edisclosure/ediscovery is avoided?</p>
<p>So, my next hob nobbing (for want of a better term?) event is at <a href="http://linkbee.com/459L" target="_blank">The Hague</a>. The event was ‘Weighing the Facts: Information Exchange and Presentation of Evidence in International Commercial and Investment Arbitration’.<br />
Note that ‘edisclosure’ was not in the title but there was a topic ‘The Present and Future of Electronic Disclosure in International Arbitration. It was a great pity that only a handful of people were at the second day (half day session only). On the second day, there was a detailed ediscovery presentation. It would have been a great finishing highlight if all the speakers/panellists could gather together (collaboratively?) and share their consensus or divergence views or experiences.<br />
In case anyone is wondering what about the IBA Rules of Evidence? What about it? From what I&#8217;ve heard &#8211; No changes required now and also in the foreseeable future. Nah! No e-evidence rules required.</p>
<p>Instead, it seems that privilege and ethical issues will become increasingly problematic in information exchange or disclosure in international arbitration. No amount of notes/guidelines/protocols/rules/laws will help cement or create a smooth level playing field for the international players and parties.</p>
<p>What have we got left then? Hob nobbing and/or guanxi? We all know what is hot tubbing.  Hob nobbing may potentially create more conflicts of interests (ethical issues) unlike guanxi relationships whereby ‘beneficial rather than conflicting’ interests are at play. More food for exploration!</p>
<p>Well…the wheels of justice chuckle along crankily with or without ediscovery/edisclosure. Maybe the good old fashion hob nobbing and/or guanxi are the new unwritten protocols/rules/laws for e-evidence. Only time will tell…</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/05/24/hob-nobbing-guanxi-and-not-hot-tubbing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>EDRM project management framework</title>
		<link>https://jollyvip.com/edisclosure/2009/05/20/edrm-project-management-framework/</link>
		<comments>https://jollyvip.com/edisclosure/2009/05/20/edrm-project-management-framework/#comments</comments>
		<pubDate>Wed, 20 May 2009 12:41:45 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[ServiceProviders]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[EDRM project management]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/05/20/edrm-project-management-framework/</guid>
		<description><![CDATA[The EDRM project management framework is in draft and available for public comment. The EDRM&#8217;s mission statement stated: The mission of the EDRM&#8217;s Project Management Workgroup has been to develop a framework and specific guidelines to serve as a standard in the electronic discovery industry regarding effective management of electronic discovery projects. Here is my [...]]]></description>
			<content:encoded><![CDATA[<p>The <a href="http://linkbee.com/36Z9">EDRM project management framework</a> is in draft and available for public comment. The EDRM&#8217;s mission statement stated: <em>The mission of the EDRM&#8217;s Project Management Workgroup has been to develop a framework and specific guidelines to serve as a standard in the electronic discovery industry regarding effective management of electronic discovery projects.</em></p>
<p>Here is my (initial) comment posted at the <a href="http://linkbee.com/36K0">legalprojectmanagement</a> blog :<br />
Ah! Interesting picture of the EPMF. My first question is why do we need a PM framework for ediscovery? What is/are missing from existing PM models/frameworks/methodologies?</p>
<p>I like Paul&#8217;s comment &#8216;the Project Manager may find herself also wearing the hat of Peace Maker&#8217;. Perhaps instead of PM for ediscovery, we introduce a new term PM for Peace Maker <img src='https://jollyvip.com/edisclosure/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> </p>
<p>Personally, I will opt for a light-weight methodology (based on my own experiences) for managing ediscovery activities. Since I am a non believer in any PM stuff for understanding and/or managing the dynamic interactions between the various stakeholders, I will just be ME and learn how I engage with others and take it from there.So understanding ME is the first step.</p>
<p>It would be great if we can prescribe a model to model the various &#8216;formed&#8217; opinions/behaviours/perspectives of the people involved in the activities. These are the stuff which makes or breaks projects, right? I am not looking for such a model as human will trump model/process simply because we have model for this/that and for people to act on. Hence we have risk management to manage risks which we can identify and anything else not identifiable we say &#8216;Acts of God&#8217; or human folly or ingenuity.</p>
<p>Thanks for sharing!<br />
Cher</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/05/20/edrm-project-management-framework/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to build bridges, start by building a raft?</title>
		<link>https://jollyvip.com/edisclosure/2009/05/08/how-to-build-bridges-start-by-building-a-raft/</link>
		<comments>https://jollyvip.com/edisclosure/2009/05/08/how-to-build-bridges-start-by-building-a-raft/#comments</comments>
		<pubDate>Fri, 08 May 2009 04:10:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[collusion of]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[bridges]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[lawyers]]></category>
		<category><![CDATA[talk]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/05/08/how-to-build-bridges-start-by-building-a-raft/</guid>
		<description><![CDATA[I have been involved with countless IT software development projects whereby many stakeholders (including lawyers) tried to work as a team to deliver a system/software to meet various requirements. I said ‘tried’ instead of ‘must’ or &#8216;need’ or ‘should’. In my role as an IT manager or project manager, I will never say to my [...]]]></description>
			<content:encoded><![CDATA[<p>I have been involved with countless IT software development projects whereby many stakeholders (including lawyers) tried to work as a team to deliver a system/software to meet various requirements. I said ‘tried’ instead of ‘must’ or &#8216;need’ or ‘should’.</p>
<p>In my role as an IT manager or project manager, I will never say to my team ‘we must get along with so and so to build this system’ or ‘we should try to <em>talk</em> to each other’. Who relishes to be ‘told’ or talk to on what to do? Definitely not want that directed at/to me and so why do it to my fellow workmates/colleague? It’s simply counterproductive and easily generate towards an ‘I told you so’ culture which ultimately leads to ‘a blaming culture’. In a blaming culture, creating a meaningful or &#8216;good stuff&#8217; outcomes gets circuited.</p>
<p>I have recently come across several articles/postings highlighting that ‘IT folks and lawyers are still not talking or failure to co-operate’ in ediscovery activities. This is the <a href="http://linkbee.com/07CG" title="Legal and IT Are Still Not Communicating" target="_blank">posting </a>which got me to blog. BTW, a catchy title &#8216;Legal and IT Are Still Not Communicating&#8217;. The posting ended by stating that &#8216;Only dialog between legal and IT will change that&#8217;. (i.e. the respective responsibilities of legal and IT still are not being carried out by many because they don’t understand them). Understanding starts somewhere and dialog is great if both parties are willing to have a dialog. Even building bridges between IT folks and lawyers have surfaced elsewhere.</p>
<p>Let it be known that it is not that IT folks are not talking to lawyers; it is most likely that ‘the talk’ is directed from lawyers to IT folks. (I am assuming in most organizations, lawyers initiate or announce the litigation hold and other ediscovery requests to the IT department).  IT folks are used to receiving requests from other departments (including lawyers). However what is unusual in ediscovery is that most IT folks (unless they are trained on ediscovery terms and have exposure to ediscovery activities or have been fully briefly beforehand by legal staff) will treat the request as an IT request rather than an ediscovery requests. It’s not that ‘we are not talking’, it’s more like ‘what are we talking about?’ and ‘how do we start to get to the ‘same starting page?’. Now, how to get both parties to turn &#8216;talking&#8217; into meaningful dialogue?</p>
<p>Failure starts when both wants to start building bridges to bridge with each other and failed to recognize that the simplest bridge is defining a raft to get to a bridge. There is always a bridge somewhere already waiting for us, just finding a raft is the first hurdle.</p>
<p>Remember the story of building a bridge?  Let’s start by learning to define a raft and not focus on building bridges as there’re already bridges (i.e. ediscovery models, tools/systems) waiting to be used.</p>
<p>Finding willing raft designers from both parties is probably the first hurdle <img src='https://jollyvip.com/edisclosure/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> </p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/05/08/how-to-build-bridges-start-by-building-a-raft/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Times They are A Changing – some secrets are out!</title>
		<link>https://jollyvip.com/edisclosure/2009/03/18/the-times-they-are-a-changing-some-secrets-are-out/</link>
		<comments>https://jollyvip.com/edisclosure/2009/03/18/the-times-they-are-a-changing-some-secrets-are-out/#comments</comments>
		<pubDate>Wed, 18 Mar 2009 02:55:22 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2009]]></category>
		<category><![CDATA[Conflicts of Interest]]></category>
		<category><![CDATA[Law Firms]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[banking secrecy]]></category>
		<category><![CDATA[bob dylan]]></category>
		<category><![CDATA[lawyer]]></category>
		<category><![CDATA[OECD rules]]></category>
		<category><![CDATA[project manager]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/03/18/the-times-they-are-a-changing-%e2%80%93-some-secrets-are-out/</guid>
		<description><![CDATA[I was feeling nostalgic listening to Bob Dylan’s music and remembered my times in Zurich (back in the 1997/8) especially the stories and tales about the gold vaults underneath the streets of Zurich! I wish I can trace my friends and ex-colleagues in Zurich so that we can re-visit and re-craft the tales in the [...]]]></description>
			<content:encoded><![CDATA[<p>I was feeling nostalgic listening to Bob Dylan’s music and remembered my times in Zurich (back in the 1997/8) especially the stories and tales about the gold vaults underneath the streets of Zurich!</p>
<p>I wish I can trace my friends and ex-colleagues in Zurich so that we can re-visit and re-craft the tales in the light of recent changes in banking secrecy in Switzerland. According to the <a href="http://news.bbc.co.uk/2/hi/business/7941717.stm">recent BBC news</a>: “The Swiss government confirmed that in line with OECD rules, it would now respond to overseas requests for information in cases of suspected tax evasion, and not just tax fraud”. Indeed the secrets are getting out and perhaps the gold vaults will also soon be opened for inspection, if my friends’ stories are indeed real.</p>
<p>I love stories especially when they stretches my imagination or lack of imagination (shock, surprises?!) and touches on my real life experiences. Well..Imaging walking above gold vaults just underneath your feet and at the same time being harassed by youngsters begging for money or small change. &#8216;Are They A Changing&#8217; too in this non-secretive age or rather in this age of no more small changes in times of depression? I do hope so…</p>
<p>I just opened an e-mail alerting me on ‘<a href="http://www.law.com/jsp/article.jsp?id=1202429060007">10 Steps to Manage E-Discovery Projects’.</a> Ah! Something just don’t change <img src='https://jollyvip.com/edisclosure/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' />  ; more steps and guidelines and this time instructing (‘like it or not’ ?!) lawyers to become project managers. Now that is a mighty call.</p>
<p>Having glanced the 10 Steps, I have only one observation (with lots of other reasons which I will not list here as they’re my secrets) that is &#8211; Project managers are not ruled by 10 steps activities nor can the ediscovery activities be codified into neat steps.</p>
<p>Imagine (now this is not lack of imagination) a lawyer (with all due respect) having to obey the code of ethics and work product or privileges stuff and then ‘like it or not’ being called to act as a project manager.  Performing and/or switching role does not mean roles and responsibilities are clear or executable. In fact the multi-roles may create more mayhem when what one needs in ediscovery are clear roles and responsibilities. Also, imagine what the IT department will think of the Legal department?! Conflict all round I should think.</p>
<p>So I thank Bob Dylan for the imagination to &#8216;get real&#8217; (lawyer acting as lawyer and project manager?!) and at the same time to imagine the impossible possible (like the change in banking secrecy).</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/03/18/the-times-they-are-a-changing-some-secrets-are-out/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
