Skip to main content

Electronic Discovery Reference Model (EDRM) is not a diagram—it’s a playbook. This isn’t a static flowchart; it’s a game plan. The EDRM is the industry-standard eDiscovery workflow that helps legal teams control costs, reduce risk, and move fast when litigation looms.

In 2025’s data-heavy environment, your best offense begins with an ironclad defense. Here’s how to run each play, confidently and defensibly.

What is EDRM?

EDRM stands for the Electronic Discovery Reference Model. It’s a framework that outlines the stages of handling electronically stored information (ESI) during the eDiscovery process, from the initial identification of data all the way through to presentation in legal proceedings. It’s not a software or a product; it's more of a best-practice guideline.

Why is EDRM Important?

I’ve worked in legal practice long enough to know that discovery can make or break a case, and it’s one of the riskiest, most expensive parts of litigation if you’re not careful. That’s where the EDRM comes in. It gives structure to the entire electronic discovery process, so we’re not reinventing the wheel every time we deal with client data, opposing counsel, or the court.

Here’s why EDRM is so important in real-world legal work:

  • Reduces Risk: Following EDRM helps us avoid missed deadlines, accidental data loss, or improper disclosures. That’s not just good practice—it protects the firm from malpractice claims.
  • Supports Compliance: Whether we’re dealing with court rules, privacy laws, or client-specific requirements, the model keeps us aligned with legal and ethical obligations.
  • Improves Efficiency: By sticking to a known workflow, we save time and money. Staff know what to do, when to do it, and how to document it.
  • Enables Better Communication: EDRM provides a shared language across legal teams, vendors, clients, and courts. It cuts down on confusion and sets expectations clearly.
  • Handles Growing Data Volumes: As data gets bigger and messier, EDRM gives us a way to scale. It’s a flexible structure that still works whether we’re dealing with a few gigabytes or multiple terabytes.
  • Builds Client Trust: When we can explain our discovery process clearly and confidently, clients feel reassured. That builds credibility and long-term relationships.

At-a-Glance: The 9 EDRM Stages

  1. Information Governance (IG)
  2. Identification
  3. Preservation
  4. Collection
  5. Processing
  6. Review
  7. Analysis
  8. Production
  9. Presentation

9 Stages of EDRM + Why They Matter

I know how overwhelming eDiscovery can feel, especially when you're trying to make sense of massive amounts of data under tight deadlines. Over time, I’ve learned that the Electronic Discovery Reference Model (EDRM) isn’t just theory, it’s a practical roadmap that makes the entire process clearer and more manageable.

Below, I’ll walk you through the 9 stages of the EDRM and explain why each one matters, so you can approach eDiscovery with more confidence and control.

Stage 1: Information Governance

Information Governance (IG) is the foundation for managing data throughout its lifecycle, ensuring it’s stored properly, retained appropriately, and disposed of defensibly.

Why Information Governance Matters: Good IG reduces the volume of data subject to review, lowers the risk of sanctions, and strengthens proportionality arguments during litigation or regulatory scrutiny. Anchoring your program to recognized governance principles and maintaining audit-ready documentation ensures defensibility, but only if policies are actually enforced, not just writte

Key Plays

  • Build and maintain a comprehensive data map (systems, custodians, and retention schedules).
  • Implement defensible deletion to remove ROT—redundant, obsolete, and trivial information.
  • Align retention and deletion policies with privacy regulations and industry standards, documenting any exceptions.
  • Standardize metadata management practices across repositories to support consistency.

Key Metrics to Track

  • Percentage of data actively managed under retention control.
  • Volume of data reduced through defensible deletion before legal matters arise.
  • Time required to produce an accurate and current data map.

Pro Tip: Automate retention processes wherever possible, but back them up with regular audits and random sampling to verify that policies are actually being followed in practice.

Join our Newsletter

This field is for validation purposes and should be left unchanged.
By submitting this form, you agree to receive our newsletter, and occasional emails related to The Legal Practice. You can unsubscribe at any time. For more details, please review our Privacy Policy. We're protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Stage 2: Identification

Identification focuses on locating potentially relevant data sources and custodians early in order to narrow scope and avoid unnecessary collection.

Why Identification Matters: Knowing where potentially relevant data lives—before a dispute heats up—saves time and avoids over-collection. Early identification gives legal teams clarity on which custodians, systems, and data sources are in play, while building a defensible record for why certain sources were prioritized or excluded. This preparation is especially valuable for events like the FRCP 26(f) conference, where demonstrating scope and readiness strengthens compliance and credibility.

Key Plays

  • Locate data sources across email, collaboration tools, cloud drives, mobile devices, SaaS platforms, archives, and legacy systems.
  • Prioritize custodians and systems based on likely relevance and proportionality.
  • Conduct custodian and IT interviews, documenting scope and rationale.
  • Record why certain sources were excluded to ensure defensibility.

Key Metrics to Track

  • Time required to complete initial scoping.
  • Number of sources identified versus collected.
  • Percentage of custodians acknowledged in writing.

Pro Tip: Use lightweight pre-collection analytics to estimate volume and likely responsiveness. This supports proportionality arguments and helps narrow the scope early, saving time and cost later.

Stage 3: Preservation

Preservation involves implementing legal holds and suspending deletion processes to prevent spoliation and protect evidentiary integrity.

Why Preservation Matters: A well-executed legal hold prevents spoliation, safeguards evidence, and protects your organization’s credibility in legal proceedings. Effective preservation means acting quickly to halt routine deletion processes, documenting every step, and ensuring custodians understand their obligations. Building a clear, defensible record of these actions strengthens proportionality arguments and shields against claims of over-preservation or negligence

Key Plays

  • Issue legal holds promptly, confirming both acknowledgment and compliance.
  • Suspend auto-deletion and retention rules where necessary.
  • Monitor compliance throughout the hold, sending reminders and tracking releases at matter close.
  • Document triggers, hold notices, acknowledgments, and follow-ups for defensibility.
  • Calibrate scope to avoid over-preservation and focus on what’s truly relevant.

Key Metrics to Track

  • Time from trigger to legal hold issuance.
  • Acknowledgment rate and average time to acknowledge.
  • Exceptions and escalations resolved during the preservation period.

Pro Tip: Use structured hold questionnaires to uncover unique or less obvious data sources early, such as personal cloud accounts, chat exports, shared drives, or mobile devices.

Stage 4: Collection

Collection gathers data with forensically sound methods while documenting chain of custody and scope to maintain defensibility.

Why Collection Matters: Defensible collection safeguards the integrity of evidence, maintains chain of custody, and ensures proper scope control. Using forensically sound methods prevents data corruption, while careful documentation protects credibility if collection practices are ever challenged. Addressing privilege and privacy considerations early also helps avoid costly mistakes, especially when data crosses borders or contains sensitive information.

Key Plays

  • Collect with forensically sound methods, preserving metadata and hash values.
  • Document chain of custody for every item and source.
  • Pilot a small collection first, then scale to avoid pulling in irrelevant data.
  • Validate completeness with sampling and custodian sign-offs.
  • Account for privilege and privacy issues before moving data off-source or across jurisdictions.

Key Metrics to Track

  • Error or recollection rate.
  • Percentage of data collected from prioritized sources.
  • Cycle time from authorization to completed collection.

Pro Tip: Targeted, iterative collection is more effective than bulk grabs. It minimizes surprises, reduces noise, and positions you better on proportionality.

Stage 5: Processing

Processing reduces data volume through filtering and deduplication while converting files into searchable formats for efficient review.

Why Processing Matters: Effective processing reduces data volume and prepares files for fast, accurate review. By filtering, deduplicating, and converting content into searchable text, you streamline the review stage while preserving defensibility. Maintaining detailed logs of processing decisions and exceptions ensures transparency and alignment with any agreed protocols, making it easier to defend scope and methods later.

Key Plays

  • Deduplicate, deNIST, and normalize metadata; convert files into searchable text.
  • Apply filters by date, custodian, or file type to stay within scope.
  • Track and document exception handling for corrupt, encrypted, or unreadable files.
  • Maintain a clear processing log capturing settings, versions, and exceptions.
  • Confirm that processing outputs align with agreed protocols or court requirements.

Key Metrics to Track

  • Percentage of data volume reduced before review.
  • Exception rate and average time to resolve.
  • Processing throughput and cost per GB.

Pro Tip: Run early analytics such as domain filters, near-duplicate detection, and email threading to build more targeted review sets and reduce unnecessary effort.

Stage 6: Review

Review examines data for relevance, privilege, and confidentiality while using technology-assisted review to cut cost and time.

Why Review Matters: Review is often the single biggest cost driver in discovery. Smart workflows and the right technology can significantly cut both time and spend while maintaining defensibility. Establishing clear review protocols, leveraging TAR (technology-assisted review), and documenting reviewer decisions help ensure consistency and reduce rework. Careful quality control and privilege checks also protect against errors that can undermine credibility.

Key Plays

  • Design a clear review protocol covering relevance, privilege, confidentiality, and issue tagging.
  • Use TAR/predictive coding with defensible training sets and validation.
  • Employ email threading, near-duplication, and clustering to speed up decision-making.
  • Calibrate privilege review and quality control checks before production.
  • Maintain audit trails of reviewer decisions and QC sampling for defensibility.

Key Metrics to Track

  • Review speed and consistency across reviewers.
  • Precision and recall indicators from validation samples.
  • Rework rate identified during QC.

Pro Tip: Stage review in waves: start with high-signal sources and time windows, validate your assumptions, and then expand scope to the broader dataset.

Stage 7: Analysis

Analysis connects people, topics, and timelines to uncover patterns, relationships, and themes that strengthen legal strategy.

Why Analysis Matters: Analysis connects the dots between people, topics, and timelines to uncover the story behind the data. By surfacing patterns and relationships early, legal teams can strengthen arguments, identify gaps, and better anticipate opposing narratives. Documenting how inferences were drawn and separating factual analytics from legal conclusions ensures the process remains defensible and transparent.

Key Plays

  • Build timelines from communications and artifacts, correlating them with key events.
  • Use concept search and clustering to identify themes and uncover missing information.
  • Mine metadata (authors, recipients, file paths, locations) to reveal hidden relationships.
  • Maintain work-product trails to show how insights and inferences were developed.
  • Keep factual analysis distinct from legal conclusions in your notes.

Key Metrics to Track

  • Time to reach insight on key issues.
  • Coverage of priority custodians and time periods.
  • Number of artifacts connected to each core claim or defense.

Pro Tip: Use communication network visualizations to identify hidden influencers and spot off-channel conversations that might otherwise be overlooked.

Stage 8: Production

Production delivers data in agreed-upon formats with proper metadata, privilege logs, and documentation to avoid disputes.

Why Production Matters: Clean, protocol-compliant productions prevent disputes, reduce the chance of do-overs, and maintain credibility with courts and opposing counsel. Aligning early on production formats, metadata, and redaction handling helps avoid friction later. Careful validation and documentation of clawbacks, confidentiality designations, and privilege logs ensure defensibility throughout the process.

Key Plays

  • Align early on an ESI protocol covering formats, metadata fields, Bates numbering, load files, and redaction handling.
  • Preserve document family relationships and thread integrity where required.
  • Generate privilege logs that are both accurate and appropriately descriptive.
  • Validate production format, completeness, and metadata against the agreed protocol.
  • Record any clawbacks, redactions, or confidentiality designations.

Key Metrics to Track

  • Hit rate of documents produced versus requested.
  • Production defect rate and number of corrections.
  • Turnaround time per production set.

Pro Tip: Pre-flight a sample production using automated validators and a human spot-check before releasing the full set to catch errors early.

Stage 9: Presentation

Presentation uses evidence, exhibits, and timelines to build persuasive narratives for negotiation, hearings, or trial.

Why Presentation Matters: Clear, credible storytelling is essential for informing negotiations and persuading judges or juries at hearings and trials. Strong presentation ties admissible evidence to compelling narratives, ensuring that exhibits, timelines, and witness prep all reinforce the same core themes. Maintaining accuracy and a clean chain from source data to courtroom materials preserves credibility and defensibility throughout.

Key Plays

  • Build concise exhibits, timelines, and theme boards anchored by admissible evidence.
  • Prepare witnesses with document packs mapped directly to key issues.
  • Maintain a clean chain of custody from source data to courtroom-ready materials.
  • Confirm that demonstratives accurately reflect the underlying evidence.
  • Track exhibit identifiers, versions, and usage throughout proceedings.

Key Metrics to Track

  • Time required to compile hearing or trial sets.
  • Objection and exception rates for exhibits.
  • Alignment of exhibits with elements of claims or defenses.

Pro Tip: Create a living “evidence storyboard” that ties each assertion to a source document and custodian—making it easy to update as new facts emerge.

EDMR Continuous Improvement Tips

EDMR is never a one-and-done process. Every case brings new challenges: new systems, different data types, unexpected volume spikes, and shifting legal risks. If you don’t pause to learn from each matter, you’ll carry the same mistakes and inefficiencies into the next one.

Continuous improvement helps you:

  • Reduce risk: By fixing privilege issues, gaps in legal holds, or weak motion practice strategies before they become repeat problems.
  • Control costs: By spotting expensive bottlenecks, cutting down on rework, and managing sudden spikes in data volume.
  • Save time: By streamlining cycle times, so you move faster from legal hold to production without sacrificing accuracy.
  • Stay defensible: By documenting improvements and showing that your team is actively tuning processes for better compliance.

Continuous improvement means making every matter a learning opportunity. Once a case wraps up, take time to debrief and adjust your playbook so the next one runs smoother.

What to Assess

When reviewing, focus on a few key areas:

  1. Scope accuracy: Did you identify and prioritize the right data sources?
  2. Cycle times: How long did each phase take (trigger-to-hold, hold-to-collection, collection-to-production)?
  3. Cost drivers: Where did expenses rise, such as from sudden volume spikes, exceptions, rework, or eDiscovery system cost expansion?
  4. Quality: What came up in QC reviews? Were there privilege issues, or motion practice outcomes that highlight weak points?

Plays to Refine

Your playbook should evolve as you spot gaps. Some practical adjustments include:

  • Updating the data map: Add any newly discovered systems.
  • Improving legal hold questionnaires: Refine escalation steps so they capture issues earlier.
  • Rebalancing “shift left” work: Move more into Information Governance and Identification, especially using AI-driven classification to lighten downstream workload.

Each round of fine-tuning helps your EDMR process get faster, cheaper, and more defensible.

The world of Electronic Discovery and Matter Response is evolving quickly. In 2025, several trends are reshaping how teams manage data, risk, and cost. Here are the key ones to keep an eye on:

Shift-Left with AI

AI-powered eDiscovery tools are changing the game. Smarter classification models and policy engines are allowing more work to move “left” into Information Governance (IG) and Identification. That means less data flowing downstream into collection and review, lowering both cost and risk.

Proportionality Front-and-Center

Courts and counsel are placing more weight on proportionality. At the FRCP 26(f) conference, expect scoping conversations to dig deeper into burden versus benefit. Teams that can show clear cost and effort tradeoffs will be better positioned to negotiate narrower, more defensible scopes.

Collaboration Data Surge

Chat tools, channels, emojis, and reactions are now core to how organizations communicate. The challenge is preserving this data in a way that keeps context and metadata intact. Purpose-built solutions will be critical for making sure these informal conversations remain discoverable and defensible.

Certifications and Assurance

With security and privacy top of mind, more eDiscovery providers are pursuing eDiscovery certifications like ISO-style programs. These certifications don’t just check boxes — they signal reliability, trustworthiness, and a commitment to safeguarding sensitive data. Expect this to become a bigger factor in vendor selection.

EDMR FAQ

Here are some questions people also ask me about EDMR and eDiscovery more generally.

What Next?

For more legal insights and resources, subscribe to The Legal Practice newsletter and join a community of innovative legal practitioners shaping the future of law.