1 / 52

Protocol Training Day

Protocol Training Day. Collection – Getting started. Introduction to the marketplace Who are the vendors What are the products What can a provider do for you. The EDRM Model. Guide(s) to eDisclosure. The UK eDisclosure Marketplace. Consultancy Firms (Large) Consultancy Firms (Medium)

aglaia
Download Presentation

Protocol Training Day

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protocol Training Day Allvision Computing

  2. Collection – Getting started • Introduction to the marketplace • Who are the vendors • What are the products • What can a provider do for you Allvision Computing

  3. The EDRM Model Allvision Computing

  4. Guide(s) to eDisclosure Allvision Computing

  5. The UK eDisclosureMarketplace • Consultancy Firms (Large) • Consultancy Firms (Medium) • Software Specific • Solutions / Bureaus • Forensic Services Allvision Computing

  6. Litigation Support Tools FTK Guidance EnCase AccessData Consilio DocuMatrix eTrium Integreon Tools Ontrack Advanceview & Inview Recommind Accelerate Suite Stroz software Viewpoint ZyLAB Systems Clearwell Nuix Digital Reef IPRO Index Engines LAW Kofax Home Brew Relativity Ringtail Equivio Relevance Case Logistix Concordance ICONECT Merrill Lextranet Opus 2 – Magnum Merrill Systems PDF Bundling Software (e.g. Zylpha) Allvision Computing

  7. Protocol Training Day Allvision Computing

  8. Processing and Reducing • Coding, clustering, email threading, key word filters • De-duplication – concept and reality Allvision Computing

  9. A mixture of software • The following slides are based on software / screenshots taken from a large number of vendors and products • If you attempted to cobble this lot together you'd probably end up like this guy Technology makes a good servant, but is a bad master. Allvision Computing

  10. Processing Allvision Computing

  11. Basic Workflow Filter Filter Filter Remove unwanted files ( CAD/JPEG/.exe files) Remove unwanted data ( Amazon/Facebook/Admin) Who / What / When ( Custodians/Keywords/Dates) InitialVolume Process Refine Review Allvision Computing

  12. What have I got? Allvision Computing

  13. Language Identification Allvision Computing

  14. Keyword Analysis Allvision Computing

  15. De-Duplication • The premise - Each ESI item is finger-printed and then all the fingerprints are compared, any duplicates are removed. • Reality – Can be technical issues, particularly with using time to create the algorithm. Work with your supplier to understand the issues. Hash Algorithm Hash Algorithm ü X Allvision Computing

  16. The trouble with Metadata • In House Litigation support department passed data and images. • Electronic information collected by either client or external vendor. • ESI turned into Tiffs for disclosure exchange. • Only images exchanged, no OCR or metadata. Allvision Computing

  17. The trouble with Metadata March 9, 2009 Allvision Computing

  18. Basic Workflow Filter Filter Filter Remove unwanted files ( CAD/JPEG/.exe files) Remove unwanted data ( Amazon/Facebook/Admin) Who / What / When ( Custodians/Keywords/Dates) InitialVolume Process Refine Review Allvision Computing

  19. Unwanted Files - 1 Allvision Computing

  20. Unwanted Files - 2 Remove unwanted file types Allvision Computing

  21. Unwanted Files - 3 Allvision Computing

  22. Unwanted Data Select the type of email we want to look at Allvision Computing

  23. Case Focus Select the people we want Allvision Computing

  24. Basic Workflow Initial Volume (20,696) Filter Filter Filter Remove unwanted files ( CAD/JPEG/.exe files) Process (11,337) Remove unwanted data ( Amazon/Facebook/Admin) Refine (5,677) Who / What / When ( Custodians/Keywords/Dates) Review (245) Allvision Computing

  25. Additional Tools Filter Images Visualise Emails Assess Volumes Allvision Computing

  26. Clustering – An Overview Allvision Computing

  27. Clustering • Client had 33,000 documents to review (about 330 lever arch files). • Average review = 200 docs/day • 33,000 divide by 200 = 165 review days • Paralegal @ £100/hour = £700/day • Rough review cost = £115,000 Allvision Computing

  28. Clusters 33,000 documents reduced to 11,000 Allvision Computing

  29. Clustering Costs • 33,000 documents = 100,000 pages • 15p/page to scan & OCR = £15,000 • Process and host the data for 3 months = £5,000 • 11,000 documents = 55 review days = £38,500 • Total cost = £58,500 Allvision Computing

  30. With Without Time (Days) 165 55 Cost £115,000 £58,000 Clustering Comparison A third of the time at half the cost Allvision Computing

  31. Protocol Training Day Allvision Computing

  32. Review and Analysis • Searching / Keywords • Hit Highlighting • Review logic / workflow • Email threads • Email Visualisation • Near Duplicates • Auto translation Allvision Computing

  33. Initial Review Allvision Computing

  34. Detailed Review Allvision Computing

  35. General Search (Key Words) Allvision Computing

  36. Hit Highlighting Allvision Computing

  37. Review Logic Rules • Before you can put the document back into the main store check to see it has been coded as: • It is Relevant AND is one of 3 states: • If Fully Privileged, all the correct coding is there • If Part Privileged, it has a redaction as well as all the correct coding. • Is set as Not Privileged. • OR It is not Relevant AND does not have any Privileged status set. • OR has no Relevance status as it has been categorised as a kind of ESI we wish to filter out. Allvision Computing

  38. Email Threads Green Emailswith an orange star are ‘inclusives’ and contain all of the contents of the previous emails. Attachmentsare also green meaning that you should review them too. Unknown Messages are where the system has identified an email that is part of the thread but the native file is not present (missing or deleted). You can still read the content of these emails within the inclusive email Allvision Computing

  39. Email Visualisation Allvision Computing

  40. Near Duplicates Allvision Computing

  41. Audio Searching Allvision Computing

  42. Automatic Translation Allvision Computing

  43. Protocol Training Day Allvision Computing

  44. Exchange and Inspection - Data Delivery • Practical differences between Native, PDF and Image renditions of a document • Effect of redactions upon format of exchange • Cost implications / rolling production / media • Listing of Privileged documents Allvision Computing

  45. Practical Differences Images (with OCR) PDF's (with Text) Native + De-NIST Clustering Filter by type, date & custodian Email analysis Unitise images Cluster Cluster + CAR Audio search Social media Objective Code Subjective Code Keyword Search Redact Objective Code Subjective Code Keyword Search Redact + Email threads Email Visualisation Near Duplicates Auto translation Hit Highlighting Hit Highlighting Allvision Computing

  46. Native Documents – The Issues Page: 1 of 32 Allvision Computing

  47. Exchange and Inspection - Data Delivery • Effect of redactions upon format of exchange • Cost implications / rolling production / media • Listing of Privileged documents Make sure your software lets you separate out a Privileged attachment from the rest of the email "family". Recent versions of some packages allow this, older ones don't, check with your vendor. Allvision Computing

  48. Protocol Training Day Allvision Computing

  49. Presentation • Major Enquiry Software • PDF Bundles • On-line Systems Allvision Computing

  50. PDF Bundles Allvision Computing

More Related