In a recent case in the High Court, concerning the development of embedded safety critical software, a claimant purported to comply with its obligations to give standard disclosure by serving on the defendant 30,000 hard-copy documents and an electronic database containing a further 226,000 documents. There were over 1.8 million pages of documentation. Whilst the case was an important one to the parties and complex in subject matter, the issues were relatively well defined, the amount at stake relatively modest (less than £10 million) and there were no aggravating features such as allegations of deceit or fraud.
As readers will be aware, standard disclosure under CPR, r 31.6 requires a party to disclose the documents it relies upon, documents that support another party’s case and documents which are adverse to its or another party’s case. The concept of standard disclosure was intended to cure the pernicious ill perceived by Lord Woolf to afflict litigation at the turn of the last century, namely, the production of mountains of irrelevant paper. It would be reasonable to suppose that the intention behind Standard Disclosure was to focus the parties’ efforts on finding documents central to the issues in dispute and not those documents, in an IT context, that relate to the ebb and flow of project life as a whole.
Every Needle with Free Haystack
In representing the defendant in the case referred to above, it was readily apparent to us and our instructing solicitors that the database that had been provided to the defendant contained thousands of documents that had nothing to do with the issues in dispute and indeed nothing to do with the project. There were thousands of duplicate documents notwithstanding the fact that electronic de-duplication had apparently taken place. There was no useful structure to the database and no folders of e-mails by individual (something that defendant thought had been agreed). We believed that the defendant was facing a needle-in-haystack situation and applied to the court for relief.
Evidence was filed by the claimant which explained how disclosure had been managed. It was an epic tale. The claimant disclosed that document consultants had been retained for the purpose of ‘assisting’ with the discharge of its disclosure obligations. The document consultants had ‘harvested’ documents from a large number of servers and tape backups (not just project servers). There can be no doubt that the ambit of the search was wide. The harvesting technique was simple: unless the file fell outside a date range (5 years) or exceeded a certain size (denoting it was code), everything was to be included. The harvest was rich. Over 8 million documents were collated.
The claimant’s explanation of how it identified documents falling within standard disclosure from its initial 8 million document harvest was highly controversial. The claimant had simply produced a set of key word filters and the document consultants had applied those filters to the harvest. Unfortunately, the key word filters failed to reduce the number of documents to a level that the claimant deemed to be appropriate for disclosure. Therefore, on advice from the document consultants, the number of key words in the filter was reduced from 333 to 133. The satisfying but perhaps unsurprising result was that the number of documents captured by the filter was also reduced, to a modest 226,000 documents. Some checks were carried out by solicitors for privileged material and the database was then disclosed. It was noteworthy that the costs paid to the consultants for their document handling exceeded the costs incurred by the solicitors by a factor of about five.
At the hearing of its application, the defendant argued that, on a proper construction of CPR Rule, r31.6, it was impermissible to disclose such vast amounts of irrelevant documentation. Specifically, the defendant submitted that by serving many more documents than those falling within the scope of sub-paragraphs (a) and (b) of the rule,[1] the claimant had failed to comply with the obligation to ‘disclose only’ documents falling within those sub-sections as required by the wording of the rule. Conversely, the claimant submitted that on its true construction the rule required disclosure of at least those documents falling within the sub-sections but placed no prohibition on disclosure of further documents that fell outside their scope. In the absence of supporting authority and evident judicial hostility, the claimant did not pursue this line of argument and the judge did not have to decide the point.
Behind the argument over the construction of r31.6 lay a fundamental difference of opinion between the parties as to the efficacy of e-disclosure software. As far as the claimant was concerned, the software was an incredibly powerful tool that had transformed the nature of the disclosure process. After all, using this tool, the claimant had managed to harvest millions of documents, run a scythe through them to find those likely to be relevant to the dispute (by the simple application of keyword searches) and had provided the defendant with a convenient, searchable database of material. It did not matter how large the database was or how many irrelevant documents it contained; documents of interest could easily be found by unleashing the power of the search tools. As Leading Counsel for the Claimant put it:
‘In no sense whatsoever is it the case that the defendants have to look at any significant quantity of irrelevant documentation. They have been provided – if they choose to take it up – … with a system of locating documents which a few years ago I suspect many of us would have given our eye teeth to have. From the picture that one is being given by the defendants one is imagining rows and rows of Lever Arch files stuffed largely with irrelevant documents and someone having to wade through them. In the old days some cases were like that, but this could not be further removed from it. This is an impressive and incredibly helpful tool that is being made available to the defendants to allow them to search within seconds or minutes for documents.’
Unfortunately, the defendant and its lawyers did not see it that way. What we saw was an enormous electronic database with no useful structure, no order and, in respect of a very large number of the documents, no reliable information as to authorship, ownership or purpose. Of course, the defendant could run searches against the database to identify documents falling with a certain date range or containing certain keywords. However, it did not have the claimant’s knowledge of the contents of the database; therefore, when constructing its searches, it never quite knew what it was looking for. Sophisticated and unsophisticated searches were tried and some relevant material was found. However, the defendant could not be sure that it had found all (or even most) of the relevant material that the database contained. Searches generally returned hundreds or thousands of documents all of which needed to be reviewed manually for relevance. Short of reviewing every document in the database, it was not possible to understand what documents were missing or what documents had been disclosed. The short point was that there was no search that could be devised that would enable the defendant to identify all documents falling within r31.6(a) and (b), and only those documents. Had it been possible to formulate such a search or searches, the claimant, who it must be assumed knew what documents were likely to be relevant, would surely have done so.
What had occurred was a negation of the fundamental principles of disclosure. The defendant did not object to electronic disclosure as such; it certainly appreciated that a searchable electronic database was far better than a mound of lever-arch files. But the claimant, it said, had not supplemented a normal disclosure process with a sophisticated electronic search tool; rather it had substituted one with the other.
As noted above, the claimant did not pursue the construction point and the judge did not need to decide it. The judge’s solution to the practical problem faced by the defendant was to order the claimant to apply a narrower agreed set of keyword filters to the database to shrink its size to more manageable proportions and to try to minimise the number of documents not falling within r31.6(a) or (b). This order was predicated on the basis that word searching could in principle provide an imperfect but workable remedy.
The claimant complied with the order. The result was a database of approximately 115,000 documents. After a number of abortive attempts to navigate the material using search tools alone, the defendant ultimately decided to undertake a time-consuming and expensive comprehensive review exercise, gathering a team of people to look at each of the 115,000 documents in turn. The case settled prior to trial, and the question of who should bear the costs of the defendant’s costly review exercise was never argued in court. From the defendant’s perspective, the claimant had failed to comply with its obligation to provide standard disclosure and the court’s solution failed to answer the point.
Conflicting Disclosure Interests
This case, in a nutshell, illustrates a common issue that arises during e-disclosure exercises, namely a misalignment of interests and understanding between disclosing and receiving parties. For a disclosing party, e-disclosure is almost paradise compared with its paper-based counterpart. Data gathering (from paper and electronic sources) becomes a readily-outsourced mechanical exercise; creating a list and locating potentially privileged documents becomes a relatively painless task involving compiling lists of keywords and typing them into a search engine; inspection involves handing over a few DVDs or (more commonly) providing the other side with access to an online database.[2] Furthermore, with its intimate knowledge of the documents, the disclosing party is usually able to find documents within its own database quickly and easily. Given their typical experience of e-disclosure exercises, it is hardly surprising that disclosing parties are frequently enthusiastic about the power of e-disclosure software and the benefits that it can bring to litigation.[3]
Unfortunately, while e-disclosure can be relative paradise for the disclosing party, all too often it is a nightmare for the receiving party. Leading Counsel for the Claimant in our case was not wrong to describe the e-disclosure facility as an ‘impressive and incredibly helpful tool’. However, what the claimant’s side appeared not to appreciate – and perhaps could not appreciate given their positive experience of the tool – was that in the absence of top-down knowledge as to what documentation exists in a database and how it is structured, a search tool is a very blunt instrument. A receiving party wanting properly to understand the scope and content of its opponent’s disclosure cannot rely on search tools alone. It must either undertake a systematic and comprehensive review exercise of the whole database, or plough on with the litigation having no idea of the scope of disclosure and knowing full well that highly relevant material is likely to remain undiscovered to the end. E-disclosure databases tend to contain much more material than their paper counterparts; a systematic trawl is invariably a costly exercise.
The problems so often faced by the receiving party of an e-disclosure database stem from two characteristics of typical electronic disclosure exercises: (a) the bottom-up way in which material is typically selected for disclosure and (b) the substitution of filing system structures with meta-data and search tools. Our aim in the remainder of this article is to explain how this happens, why it matters and what can be done about it.
Problems
Selection of material (or ‘curse of the keywords’)
One of the first (and most fundamental) steps for the disclosing party in any disclosure exercise is to devise a plan of action for undertaking the document search. In a traditional, paper-based exercise, the starting point will tend to be a conference with the client to determine who was involved in the factual background to the dispute, what documentation they created or acquired, and what they did with it. From this information, a plan will be devised to gather material likely to be relevant, to review it and to select those documents requiring disclosure. A vital characteristic of this approach is that it is top-down: it is guided and informed chiefly by the client’s knowledge of the factual matrix.
The starting point in an e-disclosure exercise will typically also be a conference with the client. However, the individuals whose knowledge is sought will not be the actors in the dispute; rather, they will be members of the IT department. The subject matter of the conference will not be the factual background but computers: how many servers does the client have? How are they archived? For how long are e-mails stored? Once these questions are answered, harvesting software will be unleashed, sweeping up and cataloguing every document created or modified within a specified date range. When the harvest is over, the crops will be subjected to an avalanche of keyword searches. If a keyword matches, a document will be flagged for disclosure; if no keywords match it will be discarded. A reasonable search for documents likely to be relevant to the dispute is substituted with an exhaustive search followed by a keyword filtering process.[4]
There is nothing wrong with keyword searches as such. Used as a tool to locate relevant material, they are readily comprehensible, transparent and efficient to implement. However, they are a blunt tool. If the keyword list is focussed too narrowly, highly relevant, disclosable documents will fall through the net; if the list is drawn too widely, the searches will pick up swathes of irrelevant material. Typically, a (perfectly proper) decision is made to err on the side of caution and to cast the net widely, accepting the inclusion of irrelevant material as an undesirable but unavoidable side-effect. However, even with such a cautious approach, relevant material will be missed. A typical candidate for omission is informal email correspondence which (for example) does not refer to a project by name. Such informal correspondence can be highly relevant and illuminating; certainly it can be the life-blood of the cross-examiner. It should certainly be disclosed.
In short, an e-disclosure database will typically contain much more material than its paper counterpart (due to the volume of material on corporate computer systems and the ease with which harvesting can be achieved), a much higher proportion of its contents will be irrelevant, and yet highly relevant material will probably be missing.
This problem is not an inevitable consequence of the prevalence of electronic data sources in the modern commercial world, nor is it an intrinsic difficulty with electronic disclosure. Rather, the problem occurs because the typical electronic disclosure exercise starts with a bottom-up trawl, not a top-down analysis, and because document review by the disclosing party is replaced with keyword search.
Structure vs Search
Documents rarely exist in isolation; they almost always belong to some sort of group. Group membership may be intrinsic to the documents themselves (e.g. a set of board minutes; a chain of email correspondence; weekly progress reports); alternatively, it may exist only in the context in which the documents are saved (e.g. a central repository of project documentation; documents saved in the ‘disasters’ folder on the Managing Director’s computer). In either case, the context can give the document meaning; conversely, in the absence of the context it can be difficult or even impossible to understand the significance of an individual document. A receiving party reviewing the other side’s disclosure will almost certainly want to review board minutes as a series, e-mail correspondence in chains, project documents as a set. Unfortunately, with electronic disclosure, this is often impractical and sometimes impossible.
In their native habitat, the relationship between documents is usually apparent because most organisations and individual users adhere to reasonably sensible filing structures for documents and (to a lesser extent) e-mail correspondence. For example, someone is likely to be charged with looking after board minutes; they are likely to keep them all together in a particular place. However, after an e-disclosure harvest, this structure – which is inherent in the host filing system but not in individual documents themselves – often vanishes. Within the world of the e-disclosure database, there is no ‘board minutes’ folder.[5] The original structures that illuminated relationships between documents is entirely absent. In its place is a giant electronic warehouse in which each document exists as an isolated entity.[6] Within this warehouse, documents cannot usually be browsed in coherent order (because the original structure is lost). The reviewer’s only tool to impose order on the data is the search facility.
The e-disclosure software market is maturing quickly and many providers now offer highly sophisticated search tools capable of unearthing documents based on multiple complex criteria. As forensic tools, used for example to evidence a witness’s involvement in a specific activity at a specific time, these search facilities are a marvellous thing. However, they are no substitute for structure. They unearth isolated documents but they rarely reveal context.
The problem can be illustrated by considering how to identify a complete set of board minutes from an e-disclosure database. Searching for all MS Word documents containing the phrase ‘Board Minutes’ (ordered by date) would probably be a good start. But such a search is highly unlikely to throw up a clean and complete set of minutes. First, there are bound to be false positives such as references to board minutes in other documents or even (depending on the sophistication of the search engine) documents that happen to have the words ‘board’ and ‘minutes’ in them. Depending on the de-duplication regime applied to the database, there may be multiple copies. In addition, the search will inevitably throw up early drafts of some of the minutes, and it might be very difficult to distinguish drafts from final versions. Moreover, one or two sets of minutes will probably be missed because of a typographical error in the title.
A slightly more sophisticated approach to searching might be to note that the custodian of the board minutes adopted a consistent file naming convention and to execute a search designed to capture all files whose name matches the relevant pattern. However, just as with the typographical error in the title, at least one set of minutes is bound to have a filename that fails to adhere to convention. Perhaps the secretary was absent one week and the temp indolent. Moreover, the efficacy of this approach is highly dependent on the expressiveness of the search language – and in this regard, some software is much better than others. The approach could also be thwarted by over-zealous de-duplication.
In reality, the basic board minute problem in this illustration is not a severe one. A search for the phrase ‘board minutes’ will find most of them; the gaps (if any) can be identified and filled by one or more broader keyword searches (e.g. ‘min*’); the number of hits can be controlled by focusing the broader searches over a narrow date range. However, the process will not necessarily be smooth and it will certainly be unduly time-consuming given the typical size of an e-disclosure database. With more complicated real-world examples, the issue becomes more real and acute. For example, once a complete set of board minutes has been located, there will usually be a need to find papers presented at each of the meetings. Such papers are often significantly more enlightening than the minutes themselves. Whereas in a paper-based disclosure exercise you would expect these to be disclosed alongside the relevant minutes, in an e-disclosure context they will almost certainly not be. Finding them can be very difficult indeed (unless they happen to contain the phrase ‘board minutes’). Likewise, typical needs such as locating chains of e-mail correspondence (in the absence of a constant ‘Subject’ line) or finding all documents worked on by a particular person in a particular date range can be complex and time-consuming to fulfil. Using search tools to answer nebulous but often vital questions such as “is there a gap in the disclosure?” takes a lot of skill, a lot of time and a fair amount of luck. Search tools are no substitute for structure and top-down knowledge.
Metadata
The impotence of search tools can be ameliorated by metadata, but only to a limited extent.
It is important to distinguish between two types of metadata. First, there is data deliberately associated with a document by a (usually human) agent (‘type 1 metadata’). This data is sometimes stored in the document itself (e.g. the ‘Title’ field of an MS Word document) but more usually stored in an external database (e.g. the ‘Client’ and ‘Matter’ fields in a solicitor’s document management system). Type 1 metadata is meaningful, usually reliable and is conceptually equivalent to the structural information so often lost in the data harvesting process. Where available, it must be imported into an e-disclosure database. Good quality Type 1 metadata can extinguish most of the problems referred to earlier in this article.[7]
The bad news is that Type 1 metadata does not often exist. Most talk of ‘metadata’ in an e-disclosure context refers to the second type of metadata. This second type (‘Type 2 metadata’) is normally not deliberately associated with a document by a human agent; rather it is generated automatically by system or application software. It includes document attributes such as file type, creation date, modification dates and author details. Whilst this metadata is undoubtedly useful, it is notoriously misleading. For example, the ‘author’ field will often not contain the name of the person who created the document but the name of the person logged into the workstation where the document was last edited (or perhaps where the template was first created). Likewise, the creation date is likely to refer to a template rather than the document itself; the last modified date could relate to the date when someone last opened the document to read it, made no changes but absent-mindedly saved it nonetheless. Moreover, metadata dates are only as correct as the clock on the computer on which they are recorded.
This article is not the place for a full analysis of the various pitfalls of relying on metadata. For now, it is sufficient to note that Type 2 metadata can be unreliable, is not the product of deliberate human intervention, and is no substitute for structure and top-down knowledge. Notwithstanding these pitfalls, metadata is an essential part of any document and, potentially, a good source of information. It is surprising therefore to find that the current Commercial Court guide (and the Technology and Construction Court guide) states that generally metadata ‘is unlikely to be relevant’ and (by implication) need not be disclosed.[8]
Does any of this matter?
If you are reading this article with a receiving party’s mindset, the reason why these problems matter are obvious. E-disclosure databases are typically much more extensive than their paper-based counterparts; thanks to the lack of structure, limitations of search tools and unreliability of metadata, there is often no alternative to reviewing every document in the database or taking a very big risk. The result is massively increased litigation cost.
On the other hand, if you are reading with a disclosing party’s mindset, you might consider the woes outlined above would give you something of a strategic advantage: you provide generous disclosure whilst knowing full well that it will occupy your opponents for months and there is a good chance that they will never find any smoking guns.
This latter view is perhaps a dangerous one. Not only is there a serious risk that you may end up paying for the receiving party’s expensive review (either because they win at trial or because they successfully persuade a judge that your approach to disclosure was woefully inadequate) but also, if you handle electronic disclosure in the manner described above, you will almost certainly be in breach of your disclosure obligations in at least three ways.
Breach 1
The judge in our case did not have to decide whether CPR, r31.6 limited disclosure to documents that fell within the description of standard disclosure or permitted the disclosure of the entire haystack. The narrow construction, we would suggest, is the correct one for the following reasons.
- The word ‘only’ serves no purpose in the wider construction; the rule would have exactly the same meaning without it. As the word is there, it was probably put there for a reason. Not only is the word there, but – as the judge in the High Court case noted – it is placed after the word ‘disclose’ and not before the word ‘requires’.
- One of the principle goals of Lord Woolf’s civil procedure reforms was to make the cost of litigation ‘more affordable, more predictable, and more proportionate to the value and complexity of individual cases’[9]. Only the narrower construction is in keeping with this goal. The wider construction protects the disclosing party but not the recipient.
- It could not sensibly be suggested that disclosing 20 relevant documents and an extra few million irrelevant ones for good measure complies with r31.6, but that would be the effect of the former construction.[10]
Breach 2
CPR, r31.10(3) stipulates that a disclosure list ‘must identify the documents in a convenient order and manner and as concisely as possible’. The practice direction expands on this as follows: ‘In order to comply with rule 31.10(3) it will normally be necessary to list the documents in date order, to number them consecutively and to give each a concise description’. Automated lists produced by e-disclosure software (whether hardcopy or virtual) will rarely comply in that:
- the documents will not reliably be in date order (owing to problems with metadata);
- the numbering system is unlikely to be consecutive or sane;
- document descriptions produced from file names and/or metadata may be concise, but will often not be descriptive;
- generally, the list will not be convenient – most likely it will be useless.
Breach 3
Whatever the true construction of r31.6, it is implicit that disclosure is predicated on the parties and/or their legal advisors reviewing the documents to determine whether the documents to be disclosed fall within or outside the test. Without some sort of review, a party cannot determine whether a document adversely affects its case or supports that of an opponent. Without undertaking some sort of review, a solicitor or client cannot properly sign a disclosure statement. The Part 31 Practice Direction states only that it ‘may be reasonable to search for electronic documents by means of keyword searches’. It is highly arguable that a review by keyword searches alone is simply not sufficient for the purpose of providing standard disclosure – indeed, it is difficult to understand how a solicitor can advise a client properly unless the documents have been read.
Fixing the problems
The e-disclosure business has expanded rapidly in recent years. An article in the February/March issue of Computers & Law promoting the benefits of e-disclosure even for small and medium-sized cases suggests that it is likely to expand further. E-disclosure is here to stay, and with good reason. Handled responsibly, there is no reason why it should not deliver on its promise of promoting efficient, agile and less costly litigation.
Too often, however, e-disclosure is not handled properly by the disclosing party. Whether too much faith has been put in the technology or whether the power of the data harvester has made disclosing parties lazy, the burden of disclosure has effectively shifted from the disclosing party to the receiving party. The burden is a heavy one, not only in terms of cost but also in terms of litigation prejudice. There is a good reason why the CPR places the disclosure burden on the disclosing party and requires the completion of a disclosure statement: it is because the disclosing party has (or at least should have) the requisite structural knowledge – it knows what it has, where its documents are and what their significance to the litigation might be.
There are two potential solutions to the problems highlighted in this article. First, there is a technical solution. Over time, e-disclosure software will improve. The ‘impressive and incredibly helpful tool’ will become more so. It should be possible reliably to maintain structure during a data harvest and navigate that structure in a convenient way. Moreover, it should be possible to replace missing structure by supplementing the blunt tool of keyword and metadata searches with more sophisticated searches that combine rule-based and statistical approaches to document matching.
Secondly, and more immediately, there is the procedural solution. Disclosing parties should adopt a more rigorous approach to e-disclosure. The starting point should not be the IT department but the relevant actors in the underlying dispute. These people should be asked what they produced, what they received and what they did with it. Only if people with the relevant knowledge genuinely cannot be found should a bottom-up harvest be considered, and only as a last resort. Wherever possible, structure should be maintained as a database is built. If the e-disclosure software cannot handle this adequately, separate disclosure databases should be maintained for, say, project files and e-mail correspondence. Sets of minutes should be imported in sequence and (to the extent possible given technical constraints) linked together. Ideally, a database of project files (where they exist) should be agreed between the parties. Ultimately, large organisations should have disclosure obligations in mind when building IT architectures from the ground up and should make provision for the creation and storage of Type 1 metadata. As soon as the prospect of litigation arises, immediate steps should be taken not only to safeguard relevant documents but also to ensure that employees with the requisite knowledge of those documents remain with the company.
CPR Part 31 encourages the parties to discuss prior to the first CMC how e-disclosure is to be approached and limited. These discussions should be real and pragmatic rather than merely lip service to the procedure. For example, in some disputes, it may be more than adequate to restrict disclosure initially to the e-mail folders of a small proportion of those involved in the project, and later to expand the scope of disclosure in a controlled and agreed manner
Recently, there does appear to be a growing appreciation among litigators (who tend to find themselves on ‘the other side’ of the disclosure wall on a regular basis) that e-disclosure can be enormously painful if not handled properly. The efforts of the LiST group (http://www.listgroup.org) and particularly their publication of the Data Exchange Protocol (Part 1 of which is now in final form; Part 2 was published in draft on 27 April 2007: http://www.listgroup.org/publications.htm) are extremely encouraging. Paragraph 1.2 of the protocol implicitly recognises some of the issues referred to in this article and addresses the core point head on: ‘It is a fundamental assumption of this Protocol that parties wishing to receive orderly disclosure in a business-like manner must be prepared to provide orderly disclosure in a business-like manner.’ This is a sentiment that should be thoroughly endorsed.
Alex Charlton is a barrister and member of the IT Group at 4 Pump Court. He is a trained and experienced mediator (WIPO Panel) and a qualified adjudicator.
Matthew Lavy is a barrister and member of the IT Group at 4 Pump Court. Prior to being called to the Bar, he spent time as a technical writer, system administrator and software developer.
[1] i.e. The documents on which a party relies, documents supporting another party’s case, and documents adverse to its or another party’s case.
[2] Although paradise compared with a paper-based exercise, a e-disclosure exercise can be time-consuming and costly for the disclosing party, as Ian Bartlett points on in the February/March issue of Computers & Law, not least because of the large amount of data that corporate computer systems tend to store.
[3] In reality, both litigating parties disclose and receive disclosure. However, in document-heavy project-based disputes, it is typically one party that has possession of (and therefore is required to disclose) the majority of the relevant documentation.
[4] This characterisation of the typical e-disclosure data harvesting exercise does not apply to all disclosing parties.
[5] Sometimes, the location from which a document was harvested is stored as metadata but this is (a) by no means universal and (b) depending on search facilities provided by the software not necessarily useful.
[6] With the exception that the relationship between an email message and its attachments is usually maintained.
[7] In a case of financial value sufficient to justify the expense, we advocate that the receiving party conducts a preliminary review of the entirety of a disclosure database and builds its own database of structural metadata.
[8] Commercial Court Guide E3.11, incorporated by reference into paragraph 11.2.3 of the Technology and Construction Court Guide.
[9] Access to Justice – Final Report (July 1996)
[10] It is not suggested that a party would be failing to comply with its obligations if it disclosed any documents that do not fall strictly within the three limbs of CPR 31.6. As Hollander observes in the Ninth Edition of Documentary Evidence ‘It is neither desirable nor practical to review and re-review the documents as the case progresses as it becomes apparent that certain documents not previously disclosed help or hinder. So whatever the rule may say, it is sensible to consider the question of what documents help or hinder with an eye to the future of the case, looking perhaps a little more widely than the rule strictly requires’ (p 166). However, as with everything under the Civil Procedure Rules, parties must have in mind proportionality and the overriding objective. A few extraneous documents would almost always be unobjectionable; a few thousand extraneous documents probably will not.