The Asymmetric Advantage Begins Here

Rule 26 Technical Advisory

A critical document or piece of evidence that is overlooked or hidden never comes into legal consideration. For all practical purposes, it might as well not exist. What is lost at this stage is lost for the life of the case.

The First Asymmetry

Any Plaintiff. Any Case. The Same Structural Imbalance.

Corporate defendants — whether a Fortune 500 manufacturer, a regional insurer, an employer, or a commercial counterparty — arrive at the Rule 26 meet and confer table with a structural advantage built over decades. Their records are held across sophisticated enterprise systems: ERP platforms, document management systems, communication archives, operational databases, and proprietary tools their IT teams understand in intimate detail. Defense counsel is advised by them.

Plaintiff's counsel typically is not.

This asymmetry is not limited to multi-district litigations or complex commercial cases. It exists in every case where a plaintiff — individual or institutional — faces a defendant that maintains its records in enterprise systems and has retained counsel who knows how to use those systems to narrow what enters the case. A single plaintiff in a personal injury, employment, or commercial matter faces the same structural disadvantage as plaintiff's counsel in a thousand-claimant MDL. The scale differs. The asymmetry does not.

Under Rule 26(f), parties must meet and confer and develop a written discovery plan. Under Rule 26(b)(1), the scope of discovery is bounded by relevance and proportionality. Both provisions are routinely and skillfully used by well-advised defense counsel to narrow what enters the case. Agreements that appear reasonable on their face can silently eliminate entire categories of critical evidence — and what is excluded at this stage rarely surfaces later.

"What is not surfaced at this stage rarely surfaces later. Critical documents that are missed, overlooked, or deliberately kept out of scope do not re-enter the case. They are simply gone."

The Rule 26 Framework

Rule 26(f) — Conference of the Parties; Planning for Discovery. Requires parties to meet and confer as soon as practicable and develop a written discovery plan governing scope, form, and sequence of production.

Rule 26(b)(1) — Scope of Discovery. Limits discoverable material to what is relevant to a party's claim or defense and proportional to the needs of the case — the proportionality standard routinely invoked to narrow production obligations.

Eliminate the First Asymmetry

Arrive at the Table with Their Advantage

We bring to the plaintiff's side exactly what the defense brings to theirs: expert-level knowledge of how major enterprises build, maintain, and manage their records — and how those practices have evolved over time. We know which systems hold what. We know which custodians matter. We know which technical arguments are designed to narrow scope rather than reflect reality. We know what is being withheld and how. Arrive at the Rule 26 table with that intelligence, and the negotiation that determines everything that follows happens on even terms — or better.

Proven Track Record

400,000+ Claimants Across Major MDLs

Crivella has supported litigation infrastructure across MDLs representing approximately 400,000 to over 500,000 claimants, including some of the largest pharmaceutical, toxic tort, and product liability litigations in modern legal history.

Pharmaceutical & Medical Device

  • Baycol — MDL 1431
  • Trasylol — MDL 1928
  • Actos — MDL 2299
  • DePuy Hip — MDL 2197
  • Zantac — MDL 2924

Toxic Tort & Environmental

  • Roundup — MDL 2741
  • Paraquat — MDL 3004
  • Deepwater Horizon — MDL 2179

Product Liability Clusters

  • Pelvic Mesh Ecosystems — 9 interrelated MDLs
  • IVC Filters — Multiple MDLs
  • Hernia Mesh — Device clusters

Securities & Financial

  • Aetna Shareholder Class Action
  • Motorola Shareholder Class Action
  • Tyco Shareholder Class Action

Strategic Role: Crivella established itself as a strategic case planning partner, expert in high-volume, high-complexity discovery environments, and pioneer in AI-driven legal methodologies.

Who This Serves

Any Plaintiff's Counsel Facing a Well-Resourced Defendant

The Rule 26 asymmetry exists wherever a defendant has more technical infrastructure, better-advised counsel, and more to hide than to reveal. That describes most serious plaintiff's practice.

Personal Injury & Products Liability

A manufacturer, distributor, or operator defending a personal injury or products case arrives at Rule 26 with enterprise quality systems, safety records, internal communications, and regulatory correspondence — held in systems their IT teams know and plaintiff's counsel does not. What gets defined as out of scope at this stage is gone. We make sure it isn't.

Commercial Litigation

A small or mid-size business litigating against a large counterparty, financial institution, or corporation faces the same data environment problem as any plaintiff. Internal communications, financial systems, contract management platforms, and decision records held in enterprise systems rarely surface without technical pressure at the discovery planning stage.

Employment Litigation

Employers defend discrimination, harassment, retaliation, and wage claims with HR platforms, performance management systems, communication archives, and payroll databases that are sophisticated, interconnected, and rarely volunteered in full. The internal records that establish what decision-makers knew, said, and did live in those systems. Reaching them requires knowing they exist.

Environmental & Toxic Tort

Industrial and corporate defendants in environmental and toxic tort cases maintain decades of operational records, regulatory filings, internal risk assessments, and communications across complex enterprise environments. The records that establish knowledge, concealment, and decision-making are precisely the records most carefully managed during discovery negotiations.

Insurance Bad Faith

A carrier's claims handling records, internal guidelines, adjuster communications, and reserve-setting documentation are the evidentiary record in bad faith litigation. These records live in claims management systems the carrier knows intimately. Without technical advisory at Rule 26, the most consequential categories of that record are routinely defined out of scope.

Mass Tort & Multi-District Litigation

The scale is larger, the document volumes more extreme, and the discovery negotiations more technically complex — but the problem is the same. Twenty-five years of MDL practice across 80+ litigations gives Crivella unmatched depth in the most demanding version of this problem. That depth transfers to every matter we touch.

What We Do

Ten Areas of Technical Support

01

Data Landscape Mapping

Before negotiations begin, we build a complete picture of the opposing party's data environment — custodians, enterprise systems, databases, third-party platforms, communication archives, and legacy environments that may hold responsive materials. Counsel walks into the Rule 26(f) conference knowing what should be in scope before the other side has the opportunity to define it.

02

Custodian & Non-Custodial Source Intelligence

Individual custodian productions tell only part of the story. We identify the non-custodial locations — shared systems, operational databases, collaborative platforms, and enterprise repositories — that hold responsive materials no single custodian would surface, and that adversaries have no incentive to volunteer.

03

Spoliation Detection

We assess whether documents and data are being destroyed, migrated, or moved in ways designed to place them beyond the reach of discovery. Evidence that disappears before it is identified never comes into play. We identify the indicators — technical, operational, and behavioral — that signal a problem before it becomes irreversible.

04

Linguistic & Terminology Analysis

Every industry and every large organization has its own internal language — terminology, abbreviations, code words, and operational shorthand that employees use in the normal course of business to describe conditions, processes, and decisions. We analyze that language before search terms and culling agreements are negotiated, ensuring that neutral-sounding limitations do not silently exclude categories of critical evidence.

05

Proportionality & Scope Defense

Proportionality arguments under Rule 26(b)(1) are a standard and sophisticated tool for narrowing production obligations. Applied without technical scrutiny, they create the conditions under which critical documents are excluded by agreement before anyone realizes what was lost. We ensure that every scope reduction is made with full visibility into what is actually at stake — and that burden-reduction agreements do not function as evidence-exclusion agreements.

06

Production Sequencing & Compliance Enforcement

We map the relationships between people and processes within the opposing organization and advise on the optimal order in which custodians and non-custodial sources should be produced — ensuring that each deposition is prepared against the fullest possible evidentiary record. After agreements are established, we use our technology to monitor production for gaps, inconsistencies, and patterns that indicate the terms of agreed obligations are not being honored.

07

Third-Party Identification

Major litigation frequently turns on what third parties — vendors, contractors, consultants, regulators, and business partners — knew, communicated, or documented. We identify which third parties are likely to hold responsive materials, assess the legal mechanisms available to reach them, and ensure they are included in the discovery plan before the window to compel their participation closes.

08

Production Format & Metadata Negotiation

The technical specifications of how documents are produced — file formats, load files, metadata fields, image standards, native file handling, and deduplication methodology — are not administrative details. They determine what can be done with the production. We negotiate production specifications that preserve evidentiary value, ensure metadata integrity, and deliver a production set that works with our analytical platform from the moment it arrives.

09

Ongoing Assessment Refinement

Discovery is iterative. As rolling productions arrive, new custodians emerge, additional source systems are revealed, and gaps in prior representations become visible. We treat our initial assessments as living documents — continuously updated against the production record to ensure that every round of supplemental requests is informed by everything the productions themselves have revealed about the opposing party's data environment.

10

Production Quality Assessment

Every production we receive is subjected to a structured technical review: completeness against agreed scope, format and metadata compliance, deduplication methodology, and gap analysis against the custodians and sources that should have been included. The result is a formal production quality assessment — a documented record of what was produced, what was missing, and what deviations from agreed specifications occurred. This record supports enforcement motions, sanctions arguments, and targeted custodian examination.

Privilege Intelligence

Privilege Review & Log Analysis

Privilege is one of the most consequential and most manipulated dimensions of complex discovery. Logs are constructed, not just compiled — and what is withheld, how it is described, and who appears in it tells a story that most plaintiff's counsel is not equipped to read.

Inadvertent Disclosure Detection

Privileged & Unredacted Material in Production

Every production we receive is assessed for inadvertently produced privileged material and exposed unredacted text. Inadvertent disclosures create evidentiary opportunities that are time-sensitive and procedurally governed — they must be identified before they can be exploited or, where required, addressed. Unredacted text that should have been withheld is among the most significant material a production can contain. We find it.

Privilege Log Assessment

Statistical Analysis of Withheld Documents & Redactions

We assess every privilege log produced and maintain running statistics on the types, dates, authors, recipients, and other characteristics of withheld documents and applied redactions. Across a complex matter with multiple productions, these statistics accumulate into a detailed profile of what is being kept out of the case — and by whom, and when. Patterns that appear innocuous in a single log become visible and significant across the arc of the litigation.

Named Deliverable

Privilege Log Statistical Assessment Report

Upon separate request, Crivella produces a formal Privilege Log Statistical Assessment Report synthesizing the full quantitative and qualitative record of privilege assertions across all logs received in the matter.

The report identifies persons and timeframes of special significance — individuals whose communications are disproportionately withheld, date ranges where the volume or character of privilege assertions departs from the surrounding record, and patterns that suggest privilege is being invoked not to protect genuinely protected communications but to suppress evidence of what was known, decided, or communicated at critical moments.

These reports have proven invaluable in challenging privilege calls and logs — providing the factual foundation for targeted in camera review requests, privilege waiver arguments, and motions to compel production of improperly withheld documents.

Extended Engagement

Rule 30(b)(6) Deposition Support

Rule 30(b)(6) is one of the most powerful tools in complex litigation. It requires a corporation to designate a witness — or witnesses — to testify on behalf of the organization on specified topics. That testimony binds the corporation. Done well, a Rule 30(b)(6) deposition produces the corporate admissions that define the trajectory of the case.

Done poorly — or against a witness who has been carefully prepared by sophisticated defense counsel — it produces little of value and telegraphs the gaps in plaintiff's technical understanding.

When the matter demands it, Crivella goes beyond technical advisory. We conduct detailed analysis of the deposition topics, develop preparation notes for counsel, build the exhibit set, and attend the deposition in person — working hand-in-hand with litigation counsel at the table to establish the corporate admissions and testimony the case requires.

Our presence is not passive. We bring direct knowledge of the corporation's systems, records practices, and organizational structure into the room — giving counsel the real-time technical grounding to press on the answers that matter and recognize when a witness is being evasive about technical realities.

Topic Analysis & Scoping

We analyze the proposed Rule 30(b)(6) topics against our knowledge of the corporation's systems and records environment — identifying which topics are most likely to yield corporate admissions and where the technical pressure points are.

Preparation Notes for Counsel

Detailed technical preparation materials — translated into language counsel can use at the table — covering the systems, processes, and records practices at the center of each deposition topic.

Exhibit Development

We build and organize the exhibit set — selecting, sequencing, and annotating documents to support the examination and maximize the evidentiary value of the testimony.

In-Person Attendance & Real-Time Support

We attend the deposition and work directly alongside counsel — providing real-time technical guidance, identifying evasive or technically inaccurate testimony, and ensuring the examination presses on the corporate admissions the case requires.

Why This Moment Matters

The Entry Point for Everything That Follows

The Rule 26 meet and confer is not a procedural formality. It is the moment at which the evidentiary landscape of the case is defined — often permanently. What is negotiated here determines what the lawyers will have to work with at every stage that follows: depositions, motions, expert testimony, trial.

Counsel who enters this process with full technical intelligence negotiates from strength. Counsel who enters without it negotiates from a position the other side has spent years preparing to exploit.

When clients trust Crivella at this stage — the earliest, most consequential stage — they find that the same expertise and technology that served them in discovery continues to serve them throughout the life of the matter. The relationship that begins here is built on demonstrated value when it mattered most.

Once production begins, the same platform powers what comes next: Unconventional Review — goal-driven, AI-powered document intelligence that deploys those documents to prove facts, not process volume. Rule 26 secures the evidentiary landscape. Unconventional Review exploits it.

The document that surfaces changes cases.
The document that doesn't might as well
never have existed.

Engagements typically begin with

  • A confidential consultation on the specific matter
  • A rapid assessment of the opposing party's known data environment
  • A pre-meet and confer briefing for litigation counsel
  • Direct technical participation in the Rule 26(f) conference
The Asymmetric System

Rule 26 Is Where the Advantage Begins. Not Where It Ends.

What enters the case at Rule 26 becomes the knowledge base for every stage that follows: early motions, depositions, trial. Defining that knowledge base is Stage One of the asymmetric system. Deploying it — with speed, precision, and grounded AI intelligence — is Stage Two.

Stage One · You Are Here

Rule 26 Technical Advisory

Define the knowledge base. Eliminate the information asymmetry.

Stage Two

Litigation Document Intelligence →

Deploy the knowledge base to win.

Start Here

Discuss Your Matter

Every engagement begins with a confidential conversation about the specific matter. Tell us where you are in the case, who you are up against, and what you know — or don't know — about the other side's data environment. We'll take it from there.

Contact Us → Next: Litigation Document Intelligence →