Handling Large Public Records Requests: The Law, the Technology, and - - PowerPoint PPT Presentation
Handling Large Public Records Requests: The Law, the Technology, and - - PowerPoint PPT Presentation
Handling Large Public Records Requests: The Law, the Technology, and the Logistics Sarah Motley Stone Womble Carlyle The Law What is a public record: All documents, papers, letters, maps, books, photographs, films, sound recordings,
The Law
What is a public record:
- All documents, papers, letters, maps, books,
photographs, films, sound recordings, magnetic or other tapes, electronic data- processing records, artifacts, or other documentary material, regardless of physical form or characteristics, made or received pursuant to law or ordinance in connection with the transaction of public business by any agency of North Carolina government or its subdivisions.
Access Rights
- 132-6(a) – inspection, examination, copies
- 132-6.1(a) – databases
- 132-6.2(e) – Not required to create or compile
a record that does not exist
S.L. 2017-10, Section 2.9, SB 131
- 132-6(a1) -- As of July 1 -- If the public agency
- r custodian maintains public records online in
a format that allows a person to view and print or save the public records to obtain a copy, the public agency or custodian is not required to provide copies to these public records in any other way.
- Example – meeting minutes, agendas, etc.
Key Exceptions for Public Schools
- 132-1.1 (a) – Attorney-client privilege
- 115C-174.13 – State testing materials
- 115C-319 – Personnel files (except the info in
115C-320)
- 115C-105.54 – Emergency response plans and
schematic drawings
- 115C-209.1 – Certain volunteer records
- 115C-105.51 – Anonymous tip lines
- 115C-402 – Student records
- 115C-404 –Juvenile court notifications
- 115C-105.27 – Safety components of school
improvement plans
Additional Resources
A Note on Records Retention: The Double-Edged Sword
- You have the records…. Great for proactive
situations (employee termination or student discipline)
- Potentially challenging in reactive situations
(records requests or litigation). Now you have to review and likely produce them!
What must be saved? Helpful language to consider from State Policy
Take-away: Think before you file the message!
Social Media
Social Media
Example from State Agencies
http://webarchives.ncdcr.gov/
The law is (relatively) straightforward. But can we leverage technology to facilitate the process?
Example – US DOJ Digital FOIA Pilot Program
Then, can we scale it for our districts?
The Technology
Collection
- Just as with a traditional paper collection, first
steps include:
– Identify likely custodians – Conduct custodian interviews to determine sources of relevant documents
Sample Questions for Custodial Interview to Identify Electronic Sources
- How many computers do you currently use in
connection with your work?
- Do you use a personal email account for
business purposes?
- Any tablet PCs or other devices which allow
you to make handwritten notes on electronic documents?
- Where do you store electronic information on
[this topic]?
– Computer – Personal network drive – Shared network drive – Home computer – External storage devices
- DVDs, External Hard Drive, Thumb/Flash Drive
Threshold Collection Question
- Generally 3 ways to collect:
– “Quick and Dirty” - Ask custodians to grab and forward responsive information – “DIY” – Utilize in-house IT resources to search and collect emails – “CSI-North Carolina” – Bring in an outside vendor to do a forensic collection
- Considerations:
– Size of potential collection – Who is asking for it and any special requests – Nature of the issue – Likelihood of future outside investigation or litigation
Collecting Email
- Outlook or Google Platform?
– Outlook – export files are PST – Google – built in “Vault,” exports as MBOX by
- default. Options to get to a PST
- Entire Mailbox or Run Search Terms?
– Search terms possible by custodian or by IT
“Quick and Dirty” Search Terms in Outlook
- Example – “All emails from named employee
about lunch.”
More Nuanced Searching
- To / From fields, including email domains
– i.e., emails between COUNTY.k12.nc.us and COUNTYnc.gov
- Date ranges
- “AND” “OR” “NOT” connectors
- More advanced syntax searching not possible in Outlook (i.e., a
request about prayer at football games “football w/5 pray”)
Collecting E-docs
- Do you need a forensic collection?
- Options are - Copy drive, folder, individual file,
etc.
- Significant impact on volume!
– 1 MB = 75 pages – 1 GB = 75,000 pages – 1 DVD = 4.7 GB = 350,000 pages
Collecting From Devices
- Text messages
- Photographs and videos
- Other user data (messaging apps, etc.)
- *This is why training is critical—employees
and board members will not react well when you explain that you need to image their entire phone!
Consider Scanning Paper
- Depending on the volume, if most of the
documents are typed (not handwritten), scanning paper may make facilitate the review, especially if responsive e and non- responsive documents are co-mingled.
- Leverage the same searching techniques once
the paper is scanned and “OCR-ed”
– Optical Character Recognition
Processing
- Suggestion – Always try to de-duplicate!
– Obtain cooperation from requestor. – If necessary, a vendor can preserve information on all duplicate custodians
- For email – consider domain exclusions
– amazon.com – noreply@.....com – ESPN fantasy football
Review
- Just as with traditional paper reviews, two key
questions:
– Is it responsive? – Is it subject to any protections or privileges?
- Personnel
- FERPA
- Attorney-Client Privilege
– What information do I want to capture about the document?
Using Technology to Assist in Review
- Let’s borrow from civil litigation to avoid linear
review.
– Newest buzzword: Technology Assisted Review (“TAR”)
- Threading
- Clustering/ “More like this”
- Search Terms
- Predictive Coding
Email Threading 101
Benefits of Threading
- Narrow/shrink volume to review
- Ensure consistent coding
– Responsiveness – Confidentiality – Privilege
“More like this”
- Clustering
– Brings together documents that may be related to each other
- “Near” duplicates
– Brings together documents that are not true duplicates, but “near”
A note on duplicates
- MD5 Hash Value = a document’s “finger print”
- Example 1 –
– I create a PDF file. It is on my desktop. I send it to you and you save it to your desktop. – These files are exact duplicates, with the same MD5 Hash value, even though they live in different places.
- Example 2 –
– I send you a Word document. You open it, correct a typo, and save it. – These files will have different MD5 Hash values. – They will also appear as “near duplicates.”
Predictive Coding
- Likely not a useful tool for a public records
request
– Unless – very, very broad request with huge potential responsive volumes
- In a tiny nutshell -- a human makes
responsive/not responsive decisions on a sample set and then the computer extrapolates this.
Old Fashion “Coding”
- Post-it notes
- Colored highlighters
- Black markers for redaction
- Paper clips, then binder clips
- Folder, folder, redwell
Coding in a Review Platform
- Responsive / Not Responsive
- Date (if no electronic data)
- Topic / Issue
- Confidentiality
- Privilege
- Needs Redaction and applying redactions
- Attorney Notes, etc.
Production Format
- Options:
– Native files – Static Image (usually PDF or TIF)
- If TIF—and a sophisticated requestor—a “load file” may
also be requested
– Metadata!!!
– Bates numbering – Other identifiers
A Minute on Metadata
- Is it required under NC Public Records law?
– Unclear. See the Metadata tag at Coates’ Canons.
- Should you produce it?
- Is there a risk?
Possible Challenges
- Poorly behaved employees
- Uncooperative board members
- Third party software/applications
Tips on Vendor Management
- Pricing
– Hourly or by the page? – Hosting fees?
- Analytics capabilities
- Support/conduct review