Beginning Next Week: InsideCounsel will become part of Corporate Counsel. Bringing these two industry-leading websites together will now give you comprehensive coverage of the full spectrum of issues affecting today's General Counsel at companies of all sizes. You will continue to receive expert analysis on key issues including corporate litigation, labor developments, tech initiatives and intellectual property, as well as Women, Influence & Power in Law (WIPL) professional development content. Plus we'll be serving all ALM legal publications from one interconnected platform, powered by, giving you easy access to additional relevant content from other InsideCounsel sister publications.

To prevent a disruption in service, you will be automatically redirected to the new site next week. Thank you for being a valued InsideCounsel reader!


6 ways to integrate work streams

Combining e-discovery, records and control of sensitive information can reduce conflict and save money

Most companies have, or are developing, programs for records and information management (RIM), in-house e-discovery and the control of sensitive information such as privacy data and intellectual property. Historically, these programs have been run as separate work streams by the legal, compliance, audit or IT organizations. But within the past year, we have begun to see a trend of companies combining these initiatives into a single work stream. Killing three compliance birds with a single program stone can save time and money.

Running separate RIM, e-discovery and data privacy programs can create conflicts or extra work. For example, the records organization may be creating retention schedules that are completely different than the information security organization’s data classification standards (often discovered late in the process). Furthermore, these work streams cover the same ground. Information collected as part of a records type inventory is often very useful for data privacy, but this information is frequently collected twice.

We have found that three separate work streams are more work, more expensive and take longer than a single, combined work stream. Consider combining your programs using these methods:

1. Incorporate data sensitivity as part of record retention schedules. Include data sensitivity classification as part of the document retention schedule, ensuring a single, content-based inventory of documents.

2. Leverage data loss protection to limit risk in e-discovery. Data loss protection tools used to protect sensitive information from leaving secure repositories can be used to corral other types of documents, reducing the scope of discovery.

3. Use ESI mapping to identify sensitive data leakage. ESI mapping processes can be used to track data in and out of secure repositories.

4. Train employees once for records, e-discovery responsibilities and privacy. Business units welcome fewer compliance training sessions, with each session covering more content.

5. Data audit processes can focus on both records and sensitive information. Data privacy audits also can examine record retention (or the lack thereof).

6. Better records archiving can make e-discovery much easier. Better control of records and other documents simplifies e-discovery.

Of course, the biggest challenge in integrating these work streams is political. Each group is mainly concerned with driving its own initiative, and is fearful of sharing limited resources as part of a larger project. Nevertheless, we have found that often the economies scale provided by combining initiatives allows these projects to go faster, reduces the likelihood of getting stuck and reduces total workload. And in times of tight budgets with too much work, reducing workload is a good thing.

author image

Mark Diamond

Mark Diamond, Founder & CEO of Contoural, Inc., is a regular contributor to Inside Counsel on Litigation Readiness and Records Information Management. You can e-mail...

Bio and more articles

Join the Conversation

Advertisement. Closing in 15 seconds.