Most organizations are well aware of the productivity and competitive advantages you can derive from optimizing your fundamental information processes.
In a previous post, “Optimizing Information Processes Helps Control eDiscovery Costs”, I discussed how eDiscovery can account for up to 90 percent of the total litigation cost. And according to a global survey from AIIM Industry Watch,1 there is plenty of room for improvement:
You can improve customer service, reduce time-to-market and increase flexibility to meet changing market — and workforce — requirements by:
But with the complexity and sheer amount of litigation facing most corporations, it’s becoming clear that process optimization can significantly mitigate your ever-rising discovery costs.
The Electronic Discovery Reference Model (EDRM) diagram, a framework used by many legal professionals to determine processes and expectations, was created in 2005 and has been in use ever since. The most recent version, modified in 2014, was changed in order to emphasize the critical role of information governance to good eDiscovery — including optimized processes.
It is critical in the early stages of eDiscovery to have a clear, comprehensive picture of where potentially relevant electronically stored information (ESI) may reside. At the outset, the data has to be identified, collected and prepared for search and review — a process that may include scanning documents. Technology is a critical and valuable tool.
Yet as we have learned through years of providing business process services to global organizations, technology is only part of the solution.
To optimize your information processes, you need to look closely at the ways information flows through your organization. For technology to be successfully applied, it must align with your business processes and today’s changing workstyles, like accessing corporate information from mobile platforms or working from home. The criticality of email in litigation is a good example of how technology needs to align with strong business processes and practices, such as dual-factor authentication and acceptable use policies, for stronger information governance.