December 11, 2024

Data Insights – Best Practices For Working With Your eDiscovery Partner

Subscribe to Our Newsletter

Newsletter


Kevin Skrzysowski

|

December 11, 2024

On Episode #30 of the Alternative Litigation Strategies podcast, host Kevin Skrzysowski sits down with author and technology evangelist W. Curtis Preston to discuss the latest eDiscovery challenges, strategies, and best practices for law firms and in-house legal departments.  Kevin and Curtis discuss what surprises lawyers the most about eDiscovery, the challenges of extracting backup information, the increasing complexity of dealing with mobile devices, and best practices for selecting and working with your eDiscovery provider. 

This transcript has been lightly edited for grammar and clarity.

Kevin Skrzysowki:

Welcome to the 30th episode of Certum Group’s podcast, Alternative Litigation Strategies, where I interview industry leaders in the legal marketplace from the top companies, firms, and academic institutions across the country. On this program, we discuss the latest trial strategies and trends impacting the litigation industry. I’m your host, Kevin Skrzysowski, a Director with the litigation consulting firm, Certum Group, where we specialize in working with businesses and their outside counsel to mitigate cap and transfer litigation outcome risk through our suite of finance and insurance solutions.

Today we have a very interesting program because we’re going to dive into a topic we’ve never covered on this program before, and that is the latest e-discovery challenges, strategies, pitfalls, and best practices that law firms should be aware of today. And to discuss this topic, I am pleased to be joined by W. Curtis Preston, AKA, Mr. Backup, a technology evangelist with S2DATA, an author of four books on modern data production, and the host of the podcast, The Backup Wrap-up. Curtis, thank you for joining the program today.

W. Curtis Preston:

Anytime, glad to be here.

Kevin Skrzysowki:

Curtis, maybe it would be a good idea if we started just by you telling us about the current business you’re involved in, S2DATA, and the range of services that you provide.

W. Curtis Preston:

So we like to talk about turning difficult things into opportunity. We tackle a lot of the really difficult technical problems that are behind a lot of different things. One part of the company specializes in the legal side of things, which is what we’re going to be talking about today, electronic discovery. On that side, we also do forensic services, imaging, every kind of computing type device, which is a giant tent that includes everything from a cell phone to a dash cam, right?

And then on the other side, we also work with IT departments that are managing their legacy data. So in our world, what that means is just as companies move forward in technology, they often buy new things, right? They buy new services, they move from this backup software to that backup software, and that leaves behind other sort of orphaned technology, which we call legacy technology. And then we help them manage the part of their company that perhaps a significant part of their IT department doesn’t know how to manage. So, we help with that as well.

Kevin Skrzysowki:

So really a full service, service 360 degree, e-discovery and computer technology services that you provide. Now, since we’re going to focus really on the legal industry today, can you tell us a little bit about what percentage of your client base are law firms and/or in-house counsel, and what are some of the particular services that you offer to them?

W. Curtis Preston:

Yeah, so I’m going to say it’s probably 60/40. That is a very unscientific number based on the fact that I don’t run the books. So based on what I see in the meetings, right? We spend a lot of time in our meetings talking about the various e-discovery services that we’re providing, and we spend a lot of time talking to lawyers, either in-house counsel, or third-party counsel to help people with those types of things.

And when we look at those, I’d say the biggest service that we’re providing is this, a client has been presented with an e-discovery request, and they either don’t have the resources to do it, or they are presented with a significant, and then we’ll talk about this, I’m sure, significant technical challenge in satisfying that request. Right? So we’ll step in and basically get all of the data that they need to get. We do that in such a way that we have a very documented and proven methodology, and we can then provide the data and we can provide an affidavit as to how that data was procured. And even depending on the client, even testifying on the stand if that’s necessary.

And then also very closely related to that but on the back end, very different, is this idea of forensic discovery. So if there’s a lawsuit or a potential lawsuit, then what we’re able to do is take, as I was saying before, phones, laptops, dash cams, security systems, any sort of thing that’s recording data and then storing it electronically. We can image that. One of the biggest things, I think there is text messages. So there are a lot of lawsuits that come down to who said what to when, and text messages are the modern equivalent to email. Email, of course, would be the biggest thing that we’re pulling out of a typical e-discovery request, but text messages you can retrieve directly from a cell phone.

And then we also have, as part of that service, one of the challenges is that when the text messages come out, they’re kind of ugly. They’re often in a spreadsheet, which is the way most people do it, but we’ve figured out a way to present them back to the client and therefore be able to present in court to look like the way they would have looked on the cell phone with… You’re familiar with the green on the left and the blue on the right, all that stuff?

Kevin Skrzysowki:

Sure.

W. Curtis Preston:

Preserving the order of the conversation and who said what and when and how, and we’re able to do that as well.

Kevin Skrzysowki:

Very interesting. I want to dive into some of the technical challenges that firms face and I want to talk a little bit more about specific challenges around text messages. But before we get there, can you just perhaps give us in just layman’s terms, an overview of what the e-discovery process really looks like?

W. Curtis Preston:

Yeah, so on your side, it’s pretty straightforward. We need all of the emails that Curtis wrote in the last five years that contain these three words, right? Or we just need all of the emails, we’re not sure what to look for but we need all of the emails written from Curtis to Steve. The requests can be all sorts of different filters. Before any discovery request comes in, a company is on a very regular basis, just any company or governmental organization, or a non-profit, they are most likely any reasonable company is backing up their data.

Kevin Skrzysowki:

Backing up the data, right.

W. Curtis Preston:

Yeah, on a regular basis they’re doing it, and they’re typically doing it actually every day, right? So you’ll do a full backup, which would back up everything. You do that every so often, and then every day you’re doing what we would call an incremental backup, backing up the data that’s changed. And you’ve been doing that and you hold onto that data for, in my opinion, far longer than you should, unless you have some sort of regulatory reason to hold onto it. But people will hold onto that data for five years, seven years, whatever, maybe even 10 years. And then you get this discovery question that says, we’ll pull out all the emails from Curtis to Steve.

The problem is that, two things, one is, again, speaking specifically in the US, right? The FRCP guidelines say that if you’ve got the data, you have to surrender it, right? It doesn’t say, well, if you’ve got the data but it’s in an inconvenient format, you don’t have to surrender it, right? But the problem is that the data is stored in backup format, which was never intended to be used as a source for e-discovery. It’s meant to be used as a way to bring back your server to the way it looked yesterday, or bring back your laptop because you dropped it and it shattered into a million pieces. That’s the purpose of backup.

And so when an e-discovery request comes in, the process of pulling the data out of these, just to speak specifically of email, pulling email out of the backup is an incredibly huge, very painful process that can take many, many months using many, many people. And also, a significant amount of resources from a technical perspective, meaning the hardware, the computers, and the storage and the tapes and the disks, all of that. It requires a significant amount of resource, much more than they would typically do in a typical week.

Kevin Skrzysowki:

And what I think I’m hearing from you is that there’s tapes and there’s disks, there may be cloud storage. So I know having worked for many legal information technology companies for last 20, 25 years, they invest or reinvest in different enterprise software and computer systems. I would imagine that these systems have changed over time and now you have to go back and try to extract that data from many different formats, from many different systems, through many different filters. Is that one of the main challenges?

W. Curtis Preston:

I’d say, yes, that is definitely one of the challenges-

Kevin Skrzysowki:

Sure.

W. Curtis Preston:

… in that, the more often you’ve switched up your backup technology, the more often you’ve changed it up. You talked about changing the backup software, you talk about moving to one of the big tape drives that we use, it’s called LTO. That’s easily the predominant tape technology for the last 10, 15 years. But there’s LTO-1, 2, 3, 4, all the way up to LTO-9, and you move forward in these tape drives in order to keep up with the latest technology. And you cannot read, for example, an LTO-1 tape and even an LTO-4 drive. There is a certain amount that you can do, but the more tapes you have and the more often you’ve changed it over the years, the more complicated the process becomes.

But the real challenge is not so much the hardware, it’s actually the software. Again, going back to what I was saying earlier, that the problem is that the format that it’s put onto tape or onto disk or in the cloud, the format was never written or stored in a way to allow you to retrieve it the way a lawyer is looking for. You go to pick your favorite backup software product with I’d say one exception, I can think of one backup product, if you purchase their extra feature that they have. Most backup products, if you go to it, there is no interface to go to say, give me all of the emails from Curtis to Steve for the last three years. It just doesn’t exist.

So what you end up having to do is, let’s say you’ve got a request for three years worth of emails. You go to three years ago and you restore your entire email system to the way it looked three years ago, and obviously you’re not doing this to your production system, you’re doing this to some alternate system. So of course this means more resources. You’re restoring it to that system and then you’ll extract from that system, you just start up this email server and you run a search against the email server for what it is that you’re looking for, and you create, a common format would be a PST file, in Exchange. So you create this Exchange file that contains the emails that you were looking for from three years ago, and this is going to take you many, many hours, maybe days, depending on your level of competence and resources you have available to you. And then you do three years minus a week ago, and you do the whole process again, and then you do three years minus two weeks ago, and you do the whole process again.

And so you’re doing, if you’ve got a weekly full backup of Exchange, which Exchange is a very common email backup system, if you’ve got a weekly full backup of Exchange, you’re looking at 52 times three, all restores of your system, followed by an extraction each time. It is an incredible process that needs a significant amount of hardware, a significant amount of time and expertise, because this is a very complicated process that you need to be able to defend in court. And so it’s just, the problem is really that you’re using a tool that was never designed to do what you need it to do in order to do what you need to do.

Kevin Skrzysowki:

It sounds like almost every matter almost takes a Herculean effort to compile all this so that it’s in a usable and digestible format and can be shared in discovery.

W. Curtis Preston:

I may sound like Henny Penny here, but it’s a significant effort. It’s so easy for a lawyer to say, “Hey, here’s the e-discovery request. Hey IT guys, go figure that out.”

The other part of this that, yes, just number one, it is a really difficult, technologically challenging problem because the product that you’re using to do it was never designed to do what you want it to do. But number two, you also typically have in today’s environment, IT departments with zero resources because they’re already stretched thin, and so they barely have the resources to accomplish what it is that they’re supposed to be doing. And then on top of that, you give them this Herculean effort.

So it’s a real challenge, and either one of two things happens. Either basically the IT department gets the significant impact to them and they’re able to do it in a, what a judge considers to be an acceptable amount of time, or they could actually take too long or make mistakes. So that would be the worst, is make mistakes along the way, and your risk is you get an adverse inference instruction from the judge that basically is the death knell of a lawsuit, right? Say, look, nobody could be this bad at reading their tapes, just assume that they’re trying to hide something, right? And there’s a famous case or infamous case with Morgan Stanley versus Coleman Holdings back in 2005 where that exactly happened and they lost a $2 billion lawsuit as a result. So, that’s sort of the problem.

Kevin Skrzysowki:

Now, and e-discovery has been around for a number of years, but I would imagine when you’re working directly with attorneys and you’re trying to explain how labor-intensive this is, how many resources it requires, how many different iterations of hardware and software you need to perform this function, they must be quite surprised at the length of time, especially when you’re dealing with lawyers, especially partners who are used to giving an assignment to an associate and say, “Draft this brief, or give me a reply and I need it by the morning.” Right?

W. Curtis Preston:

Yeah, here, go figure it out. Yeah.

Kevin Skrzysowki:

Do you find that this is incredibly surprising to lawyers and it’s challenging for them to digest?

W. Curtis Preston:

It is, it’s challenging for a couple of reasons. One, it requires understanding some rather technical nuances, right? And also, IT people, I mean, I love them, they’re my people, okay? I’ve been in IT for over 30 years. We kind of have a history of going, oh, that’s really hard. I don’t want to do it. Right? And so that doesn’t help. And so what they hear when an IT person is trying to say, “Look, what you’re asking me to do is actually really, really difficult.” I think the very natural response is to not believe it or to think that they’re exaggerating it.

And I guess what I’m trying to do, and by the way, I’ve always had this. I’ve worked for S2 now for about nine months, and it’s not like I’m just now singing this tune. I’ve been talking about this for years, that backup was never intended to do e-discovery. And what I’ve historically been pushing people to do is if they’ve got a reason to keep data for many, many years. To not use the backup system, to use a different kind of system, which is called an email archive system, but nobody’s been listening to me. So the vast majority of the IT departments, they don’t have the time or the budget to create an entirely separate system just in the, I don’t know what the… Hopes is the wrong word, in the thought that they might someday get an e-discovery request, right? They’ll just say, “Look, we’ll just do backup.” And then they also get surprised when they find out just how difficult it is. So yeah, IT departments are surprised. So the lawyers, if they’ve never interacted directly with their IT department with an e-discovery requests, I do think lawyers are quite surprised.

Kevin Skrzysowki:

And then how do you get the information so that it’s actually in a usable, shareable format in discovery? I mean, when lawyers are doing discovery, they do a request for production of documents, requests for emission interrogatories, and it’s simple like English prose, it’s just English language written down on a page and they can read the answers to it. When they’re doing an e-discovery and they’re trying to extract emails from many years ago that might be on a tape, what does the information look like when it comes out and how do you get it so that it just looks like written English language and can be shared during the discovery process?

W. Curtis Preston:

Yeah, so you need some type of format of a file that we can all agree on. Usually, 90% of the time we’re talking about Exchange, which is, it’s either Exchange or it’s Exchange replacement, which is Microsoft 365, which is their cloud version of that. But all of these can be exported into a format, a common format would be a PST. That is a format of a file that could be fed into a review platform that then allows them to sort and play with it and search against it easily. It is English. You can open up, you can take Outlook, which is a piece of software to read email, and you can open a PST file and you can look at it and it all looks normal and you see emails and you can search against it. But what most people are going to do is they’re going to take that and import that into a review platform. And there are several of those out there. But the hard part is getting it out of the very proprietary backup format and into that exportable format.

Kevin Skrzysowki:

Understood, okay. Now we’re talking about emails that are exchanged, or maybe there’s some other types of communication systems within the enterprise of the law firm or the corporate legal department. You had mentioned cell phones earlier, that’s a whole nother animal. I mean, those are not connected, hardwired to the communications infrastructure necessarily in a firm, right? These are going through another proprietary network of cell towers. How do you deal with that problem? And then, what about the issue where people might be using their personal phones for business use, and how does that fall under the guise of e-discovery, and what unique challenges does that present?

W. Curtis Preston:

Yeah, that’s a great question and there’s no easy answer, right? And I don’t think I have a good answer there, in terms of the personal cell phone. I will say that even if you’re using a personal cell phone for company work, the data that’s on that phone is still company property and I would think, this is more a legal question than a technical question, and that is that you could certainly attempt as opposing counsel, you could say, “I want everything that every time this guy was texting this guy, I want all those, even if it’s on personal cell phones.” And I would think that you would probably be able to demand that discovery.

Where I really come in is assuming that has happened, whether it’s a personal cell phone or a company’s cell phone, how do you get those messages? There’s two ways. One is, you can actually subpoena the communications company and potentially get the data that way. But another and probably more common way, and this is where we get involved, is you just get that phone. Right?

Kevin Skrzysowki:

You physically get the phone.

W. Curtis Preston:

You physically take that phone for a period of time and you extract directly from that phone. Again, this is highly specialized, requires very expensive software to extract that data off that phone. And then you have, you talk about human readable, it’s human readable, but it’s not very pretty. Think of a spreadsheet, which is what typically does, but we’ve figured out a way to present that in a much more human readable format, where it’s literally just an image that you can see who behind and what the conversation was.

Kevin Skrzysowki:

Almost like screenshots, yeah, like a rolling screenshot and reverse chronological.

W. Curtis Preston:

Right.

Kevin Skrzysowki:

Okay. So you’ve raised a lot of the unique challenges that law firms and in-house departments are facing today, and a lot of the pitfalls to try to avoid. If you were to sum up, just what do you think is the biggest challenge that is facing law firms today when it comes to e-discovery? And how does S2DATA solve it? What would that be?

W. Curtis Preston:

Yeah, so I’m going to say that it’s the format, the backup format that most of the data that you’re trying to extract is sitting in, right? It’s sitting in this very proprietary format on a tape drive or a disk or a cloud, and it’s in this weird format that most people are not going to be able to read. And then if you’re using the backup software to try to do it, the backup software was never designed to do it, so it doesn’t know what to do. And so like I said earlier, you’re presented with a Herculean task, I love your term there. Presented with a Herculean task of just doing it over and over and over again and extracting the data. It is a huge task to do.

The way we’ve figured out to do is we have figured out how to go directly at the data, basically just ignoring the backup software that wrote the data in the first place. We’ve written proprietary software that knows how to directly read the backup disk or tape where that data happens to reside, and we’re able to directly extract. You can tell us, “We’re looking for PDFs with this name, we’re looking for emails from Curtis,” and we can directly extract that and do this like as a… Before, remember how I said you have to do this full restore and then individual extractions? We’re able to do that as a single pass and do it much literally like an order of magnitude quicker for two reasons.

One is we have this proprietary software that’s written specifically for e-discovery. And two, that we have specialists that this is all they do. And three, we have a ton of hardware, whereas the typical IT department, they have just enough servers and tape drives and storage arrays, whatever it is that they’re using to get the backup done. They have just enough hardware to get the job, their normal everyday job done. We have an entire bank of tape drives that are just in robots and all that kind of stuff that are just sitting there waiting to do e-discovery requests. Right? So we can be doing simultaneous e-discovery requests for multiple clients, and we can automate it in such a way that it can run 24 hours a day. So it’s a purpose built system with a lot of extra hardware and people with expertise, is how we’re solving this problem.

And so, what the customer can do is they can literally say, “We have this e-discovery request. It looks like this. These are the things that we’re supposed to find. Here’s all our tapes, here’s all our disks, whatever it is, and just handle that for us.” And we actually have… Different clients, we work with different ways. Some are, they don’t want their data to leave their building, but some are fine with sending us their backups. We purchased a former bank, so we actually have a vault, an actual vault that we’re storing tapes in. So we take the tapes in, we can do it as a full service where you just send us your backups, we do with them what you want.

We also put all of the data, once we’ve scanned all of the tapes, we extract the metadata. There’s another technical term, so the metadata is all of the information about the emails, right? So the backups, when they were done, who they were from, all of that sort of stuff. We put that data, file names, all of that sort of stuff. We put that up into an online portal that can be searched against for further requests, or we can do this on premises for a customer that doesn’t want send their data out. But basically, you just outsource the entire operation.

Kevin Skrzysowki:

Understood. I mean, it sounds like with the proprietary software that you’ve developed, and I’m sure there’s a proprietary algorithm, my words embedded in there, so that you can complete the discovery request. The massive amount of infrastructure that you’ve built and the security that you have in your vault, you’ve really created a best-in-class e-discovery service for law firms and in-house counsel.

W. Curtis Preston:

Yeah, absolutely. And by the way, we even handle encrypted tapes. So for those that don’t know, when you write a backup tape, you can actually encrypt the backups as you’re writing it to tape, and actually the tape drive does that. There’s an encryption key that’s stored somewhere. You give us that key, and we can actually decrypt the tapes, again, without the backup software, which is very nice.

Kevin Skrzysowki:

And now that’s-

W. Curtis Preston:

So-

Kevin Skrzysowki:

… the forensics portion of your business?

W. Curtis Preston:

No, it’s just part of the backup. It’s just part of interfacing with a backup system. A normal backup software product, anytime it wants to interact with encrypted tapes, it has to pass the key to the tape drive and says, “Hey, I need to read this tape. Here’s the key,” and then the tape drive would decrypt it. We just do the same thing. Our proprietary piece of software, which is called TRCS, by the way, T-R-C-S, and it just basically pretends to be the backup software and says, “Hey, we need to read this tape drive. Here’s the key.” Right?

Kevin Skrzysowki:

Well, it sounds like you’ve created some very efficient solutions for very common problems that are plaguing the litigation marketplace. This has been a very interesting conversation, a lot of this I really was unaware of. As we’ve discussed, many lawyers are aware of the complexities of fulfilling and satisfying an e-discovery request. So, if you had maybe one piece of overarching guidance you could give to a firm or in-house counsel to help or to produce a best practices in e-discovery, what would it be?

W. Curtis Preston:

It’ll sound self-serving but it’s still my best advice, and that is, don’t do it yourself. It’s far more complex than you think it is. It’s far more expensive than you think it is to do it yourself. You think you’re saving yourself money by doing it yourself, but it will extend the time out significantly to the point that depending on how things go, you could end up looking like you’re trying to hide something to a judge. And that is, as I mentioned earlier, it’s a disaster. Right?

Kevin Skrzysowki:

That is not good.

W. Curtis Preston:

So if you’ve got a company like S2DATA that can do it for you, it will save you money in the long run and potentially actually help win the case. Now, here’s a perfect thing. Everybody thinks they’re innocent, right? Everybody thinks either they didn’t do it. There’s a million innocent people in prison, right? No company wants to think that they’re the ones that did the thing. They want to thank that the smoking gun email is not there. If that’s truly the case, having a third party go and search all of your backups thoroughly with a proven methodology documented, that you then have either an affidavit or someone testifying on your behalf to say, “Look, this is what we do for a living. We have searched all of the backups. The smoking gun email isn’t there.” That, there’s nothing more powerful than that from a defense standpoint.

Kevin Skrzysowki:

What you’re providing to that business, you’re proving it and you’re giving them the certainty that backs up their belief that they truly are innocent or not liable or right. Right?

W. Curtis Preston:

Absolutely.

Kevin Skrzysowki:

I think that’s an excellent point to finish up on. Well, Curtis, this has been a really interesting conversation. I want to thank you for joining the program today. I appreciate all of the really interesting and valuable insights you provided into the world and the technical challenges of e-discovery. Thanks for being on.

W. Curtis Preston:

Anytime.

Kevin Skrzysowki:

Now, if any members of the audience or any firms or in-house counsel who are listening to this podcast would like to get a hold of you, what would be the best way to reach you?

W. Curtis Preston:

So I’m CPreston@S2data.com. That’s S2, the number two, data.com. We actually have an offer on, so if you go to S2data.com/podcastoffer, I created a, basically, if you’ve got… So many people have a drawer of tapes, a pile of tapes, and they don’t know what’s on them. And you’re like, can these people really just scan my tapes and figure them out? And the answer is, yes. So we have an offer if you go to that, basically, we’ll scan one of those for you for free to show you what we can do and show you how easily we can solve that problem for you.

Kevin Skrzysowki:

I think that’s a great offer. Thanks again for being on, and of course, as always, I want to thank the audience for listening. If you’d like to hear more, please be sure to follow us on Apple, Spotify, Stitcher, or anywhere you listen to your favorite podcasts. And if you’d like to learn more about the litigation, insurance, and funding solutions that Certum Group provides, please visit our website at www.certumgroup.com. That’s C-E-R-T-U-M Group, or you can always reach out to me at KevinS@certumgroup.com. And until next time.

Certum Group Can Help

Get in touch to start discussing options.

Recent Content

By Ross Weiner May 5, 2026
Class action litigators who practice in the BIPA space received clarity in April 2026 following the Seventh Circuit Court of Appeals’ decision in Clay v. Union Pacific Railroad Co. (“Clay”).[1] In a concise 17-page opinion, the court held that the Illinois General Assembly’s 2024 BIPA amendments, which established that BIPA damages should be evaluated on a per-person basis, should be applied retroactively to cases pending at the time of enactment. This decision is a setback for plaintiffs’ counsel who had invested heavily—in time and resources—in BIPA litigation as the next major vehicle for class action recovery. An overview of how we got here is below followed by a summary of the decision. History of BIPA In 2008, Illinois enacted the Biometric Information Privacy Act to respond to the “increasing use of biometric data in commerce.”[2] BIPA was intended to give individuals the right to control their biometric identifiers and information while providing a right of action and meaningful damages against entities that mishandled them. But one question quickly came to the fore: was a new claim accruing each and every time an employer collected the same information from the same employee? As one defendant argued, such a per-scan theory of claim accrual would create “potentially crippling financial liability” for employers who violate BIPA by “repeatedly collecting the same information in the same way.”[3] Recognizing the question’s importance, the Seventh Circuit, in Cothron v. White Castle System, Inc., certified the question of claim accrual to the Supreme Court of Illinois. During briefing, the defendant invoked Section 20—which sets the damages a plaintiff can recover “for each violation”—to dissuade the court from adopting its per-scan reading of Section 15, citing potentially astronomical awards. In a 2023 decision, the Illinois Supreme Court sided with the plaintiffs and held that pursuant to Section 15, claims accrue “with every scan or transmission” of biometric information.[4] The Illinois Supreme Court acknowledged the prospect of “potentially excessive damage awards,” but noted that concern is “best addressed by the legislature.”[5] Accordingly, the court concluded its opinion by “respectfully suggest[ing] that the legislature review these policy concerns and make clear its intent regarding the assessment of damages under the Act.”[6] The Illinois General Assembly Acts Less than a year and a half after Cothron, the Illinois General Assembly heeded the court’s call and passed an amendment that added two clauses to Section 20. The first provided that any entity that collects biometric information “in more than one instance… from the same person using the same method of collection in violation of subsection (b) of Section 15 has committed a single violation…for which the aggrieved person is entitled to, at most, one recovery under this Section.[7] The second added the same operative language for violations of Section 15(d).[8] Going forward, it was now clear that only “one recovery” was available per person (regardless of how many scans there were), transforming potentially excessive damages into more modest ones. But the legislature left one question open: should the amendments apply retroactively to cases already in progress? The Clay Decision According to the Seventh Circuit, Illinois courts have a simple decision tree when it comes to assessing retroactivity. First, did the legislation expressly indicate the temporal reach of the amendment? If yes, case closed. If not, then the court must assess whether the amendment in question constituted a substantive or procedural change to the law. Under Illinois law, a substantive amendment “prescribes the rights, duties, and obligations of persons to one another as to their conduct or property and … determines when a cause of action for damages or other relief has arisen.”[9] Conversely, a procedural amendment involves the “rules that prescribe the steps for having a right or duty judicially enforced, as opposed to the law that defines the specific rights or duties themselves.”[10] While the Clay court acknowledged that the distinction between the two can, in many different contexts, “be unclear,”[11] the court had no trouble deciding the case at bar for one simple reason: the “amendment to BIPA Section 20 is a remedial change,”[12] and “the Supreme Court of Illinois treats remedial changes as procedural, not substantive.”[13] Two features of the amendments were critical: First, the legislature located the amendments in Section 20, which governs liquidated damages, rather than Section 15, which sets the substantive standards for liability under the Act. Second, the amendments’ plain language “focuses on remedies,”[14] indicating that an “aggrieved person is entitled to, at most, one recovery under this Section.”[15] The court’s analysis was straightforward. For those BIPA litigants involved in currently pending cases, the litigation terrain just got bumpier for plaintiffs and more favorable for defendants. Plaintiffs’ settlement leverage in these cases has been significantly reduced. Nevertheless, with enough putative class members, BIPA cases could still be worth bringing, even if they are no longer as valuable. We will continue to monitor the ramifications of this decision. Notes: [1] No. 25-2185 (7th Cir. Apr. 1, 2026). [2] Id. at 3. [3] Id. [4] Cothron v. White Castle System, Inc., 216 N.E.3d at 921 (Ill. 2023). [5] Id. at 929. [6] Id. [7] 740 ILCS 14/20(b). [8] Id. at 14/20(c). [9] Perry v. Dept. of Fin. & Prof. Regulation, 106 N.E.3d 1016, 1034 (Ill. 2018). [10] Id. [11] Clay at 8. [12] Id. at 9. [13] Id. at 8. [14] Id. at 10. [15] 740 ILCS 14/20(b), (c) (emphasis added).
By Certum Team April 23, 2026
The International Legal Finance Association (ILFA) submitted a letter this week to the Civil Procedural Rules Committee of the Supreme Court of Pennsylvania, highlighting the benefits of litigation funding and the risks associated with the mandatory disclosure of funding. The Supreme Court of Pennsylvania is considering a rule that would require mandatory disclosure at the outset of litigation of third-party funding agreements where the funder has a right to control or influence the litigation. ILFA’s letter emphasized that the vast majority of courts—including Pennsylvania courts—have declined to require discovery of funding agreements, in part because such disclosure would breach work product and attorney-client privilege protections. The ILFA letter also emphasized that the leading studies of disclosure by state courts—performed in Delaware and Texas—both concluded that third-party funding does not present significant ethical issues warranting automatic disclosure of funding at the outset of litigation. The full text of ILFA’s letter is available here .
By Certum Team April 14, 2026
Lawdragon, a leading independent legal research company, has recognized six Certum Group professionals to its 2026 Lawdragon 100 Global Leaders in Litigation Finance. The Guide recognizes the leading practitioners in the field of legal risk assessment and litigation funding. The six members of the Certum team recognized were Patrick Dempsey , Joel Fineberg , Dean Gresham , William Marra , Tyler Perry , and Kirstine Rogers .  Certum was recognized for a breadth of offerings, including not only litigation finance but also the range of Certum’s insurance offerings including litigation buyout and judgment preservation insurance. Lawdragon also profiled Marra as part of its 2026 rankings, highlighting his ability to “assess legal claims as assets and create pathways forward to pay lawyers to win strong cases.” The full rankings list is available here.