The Power of One™ .

Best Practices and Strategies for Managing Second Requests

Second requests are more intrusive and substantial than discovery requests during litigation, and they are not subject to negotiation. Let's explore some strategies for managing them effectively.
As corporate mergers become more common, regulatory activity, especially second requests, is on the rise. A second request is additional information requested by antitrust agencies, such as the FTC and DOJ, after companies voluntarily provide information during the 30-day period required by the Hart-Scott-Rodino (HSR) Act of 1976. Second requests are more intrusive and substantial than discovery requests during litigation, and they are not subject to negotiation. In this document, we will explore best practices and strategies for managing second requests. Strategies to Consider:
  1. Anticipate and Prepare It is worth anticipating the necessity of a second request and engaging in a company-wide data-mapping process once a merger is announced. Learning exactly what data the company has and where it is located is good policy, and it is essential when approaching a merger.
  2. Use Model Requests Once the data-map is complete, companies can consult model requests from the DOJ or FTC to begin identifying potential information that will be requested. Combining the data-map with the model requests can give a starting point that is ahead of the curve.
  3. Utilize Technology For second requests, technology is mandatory. The volume of data requested and the time-frame make it indispensable. Plan to make extensive use of predictive coding, augmented intelligence workflows, and technology-assisted review (TAR). Ensure the team has all of these tools at their disposal and knows how to use them.
  4. Get an Experienced Team A team with prior experience on multiple second requests is essential. Look for a team that has been together for years and has developed reliable strategies and workflows to handle the specific challenges of second requests.
  5. Perfect the Process Process is essential for all reviews, and second requests heighten this reality. At the minimum, sequencing, accountability, and escalation processes are mandatory. A process that incorporates real-time collaboration and how counsel wants to handle privilege and exception planning is necessary.
  6. Pay Attention to GDPR Review teams must pay attention to GDPR and similar data-privacy regulations. The rules that govern privacy frameworks in the type of large data sets associated with second requests can be complex and overlapping. Compliance is essential to production, so make sure to have privacy expertise on the team.
Conclusion: By anticipating the demands of second requests and utilizing best practices in process, technology, and team building, a potentially difficult situation can be made seamless. In general, an internal team may not have the resources and expertise to handle a project of this scale. ALSPs like Trustpoint.One have come to prominence because of their combination of granular expertise and cost-saving focus. For more information or to speak to an expert in second requests, please visit www.trustpoint.one.
Speak to a review specialist to learn more about Trustpoint’s expertise in managing complex Second Requests.