!"#$%&'(&)'*!%*!+& -./0#123-/45#67-689:5;#<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<!"$##

Size: px
Start display at page:

Download "!"#$%&'(&)'*!%*!+& -./0#123-/45#67-689:5;#<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<!"$##"

Transcription

1 EDRM.NET

2 "$%&'(&)'*%*+& INTRODUCTION TO THE EDRM " CAVEAT EMPTOR$ SYSTEM MANAGEMENT AND SECURITY% APPLICATION PLATFORM AND USER INTERFACE & EDRM IDENTIFICATION' EDRM PRESERVATION' EDRM COLLECTION( EDRM PROCESSING) EDRM ANALYSIS * EDRM REVIEW+ EDRM PRODUCTION ", CONCLUSION"" -./0123-/ :5;<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<"$

3 As the e-discovery market space and its many solution providers continue to evolve, so does system complexity. Organizations looking for e-discovery solutions may become overwhelmed by the breadth and depth of the market. This paper is intended to serve as a guide to assist organizations in vetting such software. While the document aims to be comprehensive, not all criteria listed will apply to every organization. Therefore users are advised to treat this guide as a starting point and tailor its advice to the specific needs of their own organizations. At a minimum this paper should serve as thought provoking input and better prepare readers to make a well informed decision regarding e-discovery software and services." INTRODUCTION TO THE EDRM " Traditionally, no matter which tools an organization uses to address the EDRM at a minimum the data must be identified then collected, processed for analysis, internally reviewed and culled, and then that reduced data set must be processed again for import into to a legal review tool for outside counsel. Some organizations use three or four different products, one to address each phase. In this case, the data must be processed each time it moves from one tool to the next. Any analysis, comments and tagging done during the internal review phase are lost when the data is imported to the legal review product." Traditional Model" SOURCE: EDRM.NET EDRM BUYER S GUODE 1

4 While it has been recognized that the traditional model is purely conceptual, non-linear and iterative, the practical workflow for e-discovery frequently looks something like this:" " " Iterative Process At each cycle of data ingestion, processing, analysis and export expense is incurred and information and time are lost. This is a problem, as it is risky, costly and inefficient. Each time data leaves one cycle to begin another it is exposed to risk and data loss. Also, since new products and services are needed at every phase, costs for law firms and corporations rise with each iteration. Frustration levels also rise as professionals who are trying to focus on practicing law or critical business processes, instead find themselves juggling multiple data load formats, service providers and review platforms." " CAVEAT EMPTOR" Unfortunately the e-discovery space is still very much buyer beware due to the large number of service providers and myriad of software choices. It s impossible for a firm to do an exhaustive review of all providers in the market. As a stand-in for a total market survey, a firm looking to purchase software or services should include testing and a thorough proof of concept process as basic best practices for each candidate in a set of possible solution providers. Any vendor requiring upfront payment for POC activity is likely after a quick dollar, not interested in solving the firm s business problem, and should therefore be avoided. Vendors should be happy to work with organizations to show them what their software can do in a real environment. Any reluctance to do this can only be seen as a red flag. % Another warning sign is the existence of a pay-per-use billing model. Many vendors have adopted this pricing model which can seem manageable in the beginning, but will become burdensome and lead to proportionality conflicts once cases progress. The amount of electronically stored information is not decreasing, but growing "$%&'()*%+',"% "

5 exponentially, which means per-gig fees will only continue to climb. A realistic and forward thinking cost analysis performed before adopting pay per use solutions can be illuminating and useful for organizations. A thorough review of the vendors health should be included. Financial standing along with years in business and client base should be reviewed and evaluated against other players in the space. A client list should include those willing to provide reference calls. The calls should be with clients that are actually using the solution in a way that closely maps to your planned implementation. References can provide you with an objective assessment of product and vendor support, so make sure to ask about both. Finally, no solution is complete without some level of professional services engagement. Whether it be for simple training or to augment the existing team, verify your chosen provider has the breadth and depth to meet the ever fluctuating demands of your organization. SYSTEM MANAGEMENT AND SECURITY Before even entering the realm of EDRM preparedness, an organization should consider its system management and security needs. At a minimum any software the firm purchases should accommodate flexible user access, including the ability to support the existing roles and responsibilities of the organization. Consideration should be given to: User roles and access rights should be customizable and not force the organization to adopt a specific workflow or team makeup. If the organization uses Active Directory, that should also be integrated by the chosen software to allow for centralized ID management and authentication. The solution must provide a rich set of system audit and logging reports to determine user activity at a specific date and time. Access to the logging feature should be severely restricted to serve as valid input for establishing chain of custody, as well as supporting user management activities by showing who has what access. The system s communication and security protocol must also be robust and support the organization s needs and current configuration. The security feature s overarching function should be to prevent unauthorized use of the system or system components. Workflow steps should be clearly broken out and allow for tasks to be input into the system without an undue burden on multiple parties. Further customization to fields within the user interface should support organization requirements and changes. %,-.&/0%-1+&2/3,%& %

6 APPLICATION PLATFORM AND USER INTERFACE The application platform of any competitive product should make full use of current technology including 64-bit operating systems, clustering technologies, true multi-threading and various OS versions. It should also be lightweight, flexible and allow for remote access. Include evaluation of the following: The application should support both the novice and experienced user and require minimal training to operate. Reduced learning curve equates to more time spent on business critical functions. The solution should be as agnostic as possible, because it s essential that the system play well with others (for example supports numerous files types and forensic containers and able to export multiple load files) since the market is diverse with many organizations using different providers with unique requirements. As for hardware, the application should not have limitations on number or size of RAM or CPU and must have the ability to scale to meet the geographic, network and workload demands of your organization. Make sure the solution doesn t create chokepoints for other business processes. Evaluate based on peak processing and/or collection requirements and be certain that the solution can support them, but also assume the current workload and organization structure will grow exponentially over time. The chosen solution should not require material reinvestment to meet growth requirements. Some basic performance metrics to measure can include collection times, processing times per/gb, per/tb, time it takes to open a document in review panel, time needed to export GB or TB of data, time to render (TIFF/PDF) GB or TB of documents. Finally, the user interface driving this whole process must be web enabled. Preferably the interface will leverage web browser technology cleanly, requiring few third-party add-ons or the installation of native applications for viewing certain file types. This allows for an access anywhere capability while being lightweight from a resource and IT management perspective. The web-enabled UI should also support dual monitor review with interchangeable review panels for maximum reviewer efficiency and flexibility. %,-.&/0%-1+&2/3,%& &

7 EDRM IDENTIFICATION The EDRM Identification phase includes development of a plan, as well determination of sources for potentially relevant ESI. One of the essential parts of the identification phase is custodian tracking, because it helps organizations be proactive about where information resides and facilitates litigation preparedness. Historical custodian detail should be readily accessible to understand what other cases/matters a custodian was involved in and what data was collected in conjunction with that matter. Commonly stored data will include custodian , phone numbers, business unit, case and other pertinent workflow details, which the system should be able to preserve and organize. Part of the system s ability to track custodians should be supported by structured data connectors, which should integrate between the system and the firm s existing programs. The Data Map may be the most crucial part of the Identification phase, because knowing where the data is and its accessibility level is intrinsic to planning the entire case strategy. Thus the data mapping functionality should be robust and should include the ability to record and update potentially relevant data repositories, such as PCs, systems, SharePoint, archiving systems, other structured data repositories. It is essential that this functionality be built-in so that organizations do not have to incur the additional expense or complexity of using a third-party provider. Hand-in-hand with the Data Map is the pre-collection audit capability, which allows organizations to survey their information universe before they start the onerous work of collecting. Support for this functionality should include the capability to run search criteria against a potentially relevant target and provide results without actually copying the underlying files. The pre-collection audit option is preferable to solutions that have to pull data back to index and report on potential search criteria, because it is much faster. This can be a key advantage especially early in a case or when tight deadlines are approaching. Pre-collection auditing minimizes system and network impact and eliminates overhead, because it reduces the storage of extraneous data for early case assessment activities. The importance of the pre-collection auditing capability should not be understated because the practice will continue to grow in significance as organization data grows in size and complexity. EDRM PRESERVATION The EDRM Preservation phase includes data isolation and notification to appropriate parties that data related to an upcoming law suit must be preserved. The largest, most important part of the preservation functionality is the Litigation Hold System. This piece of the software comes into play the moment litigation is contemplated by the parties and thus should lay the foundation for a highly organized and efficient case work flow. Litigation hold functionality should be fully integrated and not require %,-.&/0%-1+&2/3,%& '

8 third-party add-ons. This is because integration provides the benefit of centralized management of all custodians and eliminates the complexity and cost of introducing a distinct system into the IT environment. Some essential components of a comprehensive litigation hold system include: Up to the minute progress tracking of all statuses within the matter (including custodians and IT specific managers or data owners) Optional workflow approval sequence for attorney or paralegal review Templates and other customization tools to increase efficiency Distribution and management of attachments and custodian interview Q&A recording and support The system should be able to produce electronic and hard copy reports for use internally or with external parties EDRM COLLECTION The EDRM Collection phase includes acquisition of potentially relevant electronically stored information (ESI). Collection should include both the document/file, as well as any associated metadata. Collection is a crucial part of the e-discovery process, which is reflected in the wide spectrum of offerings and definitions in this area. Many providers offer some level of collection, but few have years of experience and a solid track record of delivering defensible results. Collection and Processing capabilities should be heavily scrutinized to separate inflated marketing spin from the real thing. Organizations should take particular care to test and ensure data is not being dropped or missed (open files and , system files, large files, etc.) during collection. While certainly not a court requirement, forensic data collection inherently achieves a degree of defensibility not available in a non-forensic collection. Forensic collection has other advantages, as well as heightened defensibility, including the ability to audit the collection and the ability to collect deleted files. No longer solely the domain of law enforcement, forensic collection is rapidly becoming understood and sought by opposing counsel and the courts. The organization that chooses a tool with forensic collection capability not only chooses the strongest level of collection stability, but puts itself at the front of a developing trend. Whether the chosen solution offers a forensic collection capability or not, the collection solution must have a certain set of functionality in order to be minimally acceptable. Organizations should review and ensure: Solution needs the ability to collect open files or files currently in use. Tools that fail to meet this critical criteria fall short of being legally defensible and leave organizations open to charges of incomplete preservation. %,-.&/0%-1+&2/3,%& (

9 Ability to (but not require) capture a full disk imagethis becomes especially useful in criminal investigations when a collection window is short. Case or custodian specifics can dictate the necessity for full-disk imaging (employee malfeasance or termination). The collection tool must have a full spectrum of criteria for both inclusion and exclusion, including the following: keywords (with full set of operands), file extensions, file type (internal file identification), file dates (accessed, modify, create, etc.), file path, file size, MD5 hash, archive search (ability to search and collect from compressed file types). Incremental collection capabilitymeaning the solution should offer the ability to collect all modified or newly created data since the date of last acquisition. This is particularly critical for lengthy matters or matters that have a large number of mobile custodians. Also important since most organizations have many potential custodians located offsite and outside the corporate network, is the ability to collect from employee laptops that are not logged into the corporate network. There should be a robust and valid throttling capability to limit network and resource impact when acquiring data during peak utilization periods or where available network bandwidth comes at a premium. The system should generate reports on non-responsive files (list of all files which did not meet search criteria and were therefore not collected), reports which describe the collection criteria w/associated hit counts, data sources, legal matter as well as custodians involved, and report a list of all collected files by name, type, source and size. Finally a solid collection tool should not interrupt custodian s day to day business activities. The process should be transparent to the end user and be automated to the extent that a collection is completely repeatable from one custodian to the next. EDRM PROCESSING The EDRM processing phase typically includes indexing, itemization and some level of data identification within the subject data universe. The processing phase is the real workhorse of the e-discovery lifecycle. Within this phase all data that was collected previously gets extracted and turned into information that can be culled down for greater relevance and read by review platforms in the next phase. As such, speed and accuracy are at a premium and a great deal of marketing dollars has been spent on claims related to data processing speeds (e.g. TB/day). The reality is that most of these claims are made using state of the art hardware platforms (prior to any licensing fees). The ideal solution should be one that can easily and affordably scale using existing hardware to achieve processing speeds of terabytes per day. %,-.&/0%-1+&2/3,%& )

10 As always, the best advice is to run a thorough POC (proof of concept) with your own exemplary data set and a full understanding of the service level objectives within your company. The single criterion that carries the most variance across e-discovery vendors is processing diligence (accuracy); meaning the thoroughness and accuracy of the processing tool. Because processing happens under the hood, data can easily go missed and undetected or unreported to end users. This is another area where vendors have produced elaborate pieces of marketing collateral to cover deficiencies in their processing routines deficiencies, such as the lack of extensive exception handling and reporting and QA/QC methodologies. However, we are strong advocates that the only way to truly assess and make a wise investment is to do a side by side comparison ( bakeoff ) of the competing technologies to see if one or both are dropping data or missing important information. All data as well as metadata should be maintained and tracked throughout the collection and processing sequences. Every organization should create a representative data set, run it through the competing tools, and perform a side by side analysis. The organization should then repeat with the same dataset. The results may be surprising and but will reveal which tools are doing the most accurate and comprehensive job. Other key capabilities include: Integrated Optical Character Recognition (OCR); the ability to extract text from document images or PDFs so that it can be searched in subsequent e-discovery phases. The program should also be able to perform full text extraction from electronic documents and to facilitate the same. The application should support a full range of document de-duplication (identification of exact duplicates) options and should flag and optionally remove duplicates, then generate reports showing which documents/ are duplicates with associated counts. EDRM ANALYSIS The EDRM Analysis phase includes evaluating the collected and processed data to determine overarching information about key case topics, players and documents. For the purposes of this guide Analysis is synonymous with Early Case Assessment and Early Data Assessment. The Analysis or Early Case Assessment ( ECA ) phase of the e-discovery process entails taking the large and unorganized set of data from the processing phase to determine what type of case you have and whether you should go forward with the discovery process or look at settling. For this reason, analysis tools support the functions of categorizing, refining and bucketing data. The most well-known function is keyword searches and culling. All applications should have an efficient and effective method for using keywords to analyze and reduce the subject corpus of data down to a manageable subset. %,-.&/0%-1+&2/3,%& *

11 In addition qualified candidates should include the following: In-document hit highlighting, keyword counts and summaries Data and evidence bookmarking at the global and case level to support categorization and organization Supports the easy addition of data and assigning it to a specific matter or custodian at any point during the analysis or review phase without requiring complete reprocessing Pre-defined buckets and document categorization, which allows the user to apply broad filters, such as file type or a date range to the data set Threaded view of is also intrinsic to a quick and holistic analysis of the data. The application should support a dedicated view of that allows for a contextual understanding of the chain of communication, including parties involved and subjects Comprehensive support for most legal review tools including; iconect, Introspect, Relativity, Ringtail, Summation, EDRM XML and generic. Load file templates for quick and consistent creation should be included. Finally, analysis and reporting in the ECA/EDA phase should be able to quantify and present which documents did and did not meet search criteria. These reports and metrics are critical input to further development of overall case strategy and can influence whether or not the user performs additional collections. Reporting can also help to quickly determine if chronological or conceptual gaps exist in the current data set. EDRM REVIEW The EDRM Review phase focuses on sub-categorizing documents to identify relevant facts, further refine case strategy, and reduce risk to the client. Review is generally conducted by an attorney or other skilled practitioner. The EDRM Review phase is the stage where documents receive the most scrutiny by the most highly trained (legally, not technically) users. Therefore clarity and ease of use are extremely important, as these practitioners need to spend more time on legal analysis and less time on mastering software. To be ideal, the system must give a very detailed picture into the evidence and individual documents, yet be extremely intuitive. Many successful systems employ a multiple tier user interface that can accommodate both novice users and those needing advanced functionality. This helps to solve the business problem of requiring clarity and ease of use with the ability to support all case needs completely within a single tool. The multi-tiered user offering should be administered via granular security permissions and grouping structures that allow case managers to be flexible in creating review hierarchies and strategies. These permissions should be easily configured at any point in the review cycle and should include the ability to restrict or allow access to all software functionality. %,-.&/0%-1+&2/3,%& +

12 Some of the basic components review software should offer include the following; Large and clear document viewer that can be undocked to move to a split screen Flexible review screen allowing user to design an optimal viewing area with document summary Image and tagging view; a near native document viewer which allows user to view multiple (preferably hundreds of) file types without requiring installation of the native application, thereby speeding review time and significantly reducing cost and installation complexity Bulk tagging/coding of document groups and document families Unicode support to enable viewing and searching of foreign languages Conversion and export into review platform load files and hard copy output Redaction and document marking support, including text overlay, as well as custom color schemes. Redactions should appear transparent when performing review but be optionally burned-in at time of production Persistent text highlighting to support the designation of chosen terms to always appear highlighted across , attachments and loose files Ability to render (image) native TIFF and PDF documents on the fly so that native documents may be marked and produced. This should include support for single and multi-page TIFFs and PDFs, customization for compression, as well as color and B&W formats Near-duplicate capability that identifies similar documents, s and loose files, and allows them to be visually compared with differences clearly called out EDRM PRODUCTION The EDRM Production phase encompasses export and exchange of electronically stored information in response to a production request between parties. Production completes the arc of the e-discovery process, but includes much more than just printing documents out of a review platform and attaching a privilege log. Today s productions come in many formats and some may never see paper. Therefore an organization s production capability has to be capable of handling not only the traditional production duties of redacting, printing and numbering, but be able to produce data in its many formats and load file %,-.&/0%-1+&2/3,%& ",

13 iterations. The Production workflow should also be flexible and allow for the creation of empty production set buckets to which documents can be added or from which documents can be removed as case objectives change. While production is not quite synonymous with export, the way data gets out of a system is still an intrinsic part of the production process. Data should be available to export from the system in various formats, including load files, native files, images or forensic containers (supports portability or in cases of criminal matters). Exporting data should not incur an additional expense/fee or require the use of a third-party application. Since the legal world is far from giving up paper, production features for the classic method should be strong. An application should include the ability to burn in redactions, mark-ups and stamps and to Bates number productions sequentially. The stamping/bates number functionality should include header or footer placement, a prefix option, as well as a starting sequence and padding. The option to start numbering from a previous production set must be included for proper data management. Along with supporting the output of documents from the system, a good product will also give the user ways to manage and track productions throughout the life of the case. For example, load file volume and document options support should be included for any number of foldering options to support work with an outside vendor upstream or downstream of the production phase. Also, custom data columns should be present in the case database to assist in meeting the needs of existing processes systems, outside counsel and partners. Support for rolling productions sets is also key to allow an organization to maintain continuity and track data at the file level. Production set status should be readily available to support decision processes and Doc ID and Bates numbering should pick up where the previous production set left off. Full logging of production sets including user, file name, file counts, production set size and associated matter should be available to track progress and support data management. Branding history, including numbering, Doc ID and any watermarks should be logged and available for reference. CONCLUSION Please use this guide as it was intended; as a series of suggestions and best practices to help organizations choose the best e-discovery software for their workflows and practices. While this guide is primarily focused on the underlying technology evaluation of the vendor, a vendor s willingness and ability to be a full, skin-in-the-game partner should be integral to the overall evaluation process. Institute a POC policy and test the software in a pseudolive environment before purchasing. If possible, do a side-by-side comparison of various products to see which performs best. And always shy away from vendors who are not completely open about their product and service limitations. Hopefully with this guide in hand you will be helped to make a well-informed decision regarding e- discovery products and services. %,-.&/0%-1+&2/3,%& ""

14 EDRM BUYER S CHECKLIST This document is intended to be a tool to assist in vetting e-discovery software. As the market space and solution providers continue to evolve, so does the complexity of the systems. While this checklist is intended to be a comprehensive document, we understand that not all criteria listed apply to every organization. Therefore please use this guide as a starting point and tailor to the specific needs of your organization. At a minimum, it should serve as thought provoking input and better prepare you to make a well informed decision. Unfortunately this space is still very much buyer beware. The best advice is to test and conduct thorough POCs with your set of considered solution providers. Vendors requiring upfront payment for POC activity are likely after a quick dollar and not interested in solving your business problem and should therefore be avoided. Additionally many vendors have adopted a pay-per-use model, which can become burdensome and lead to proportionality conflicts. Thought and cost analysis should be performed before adopting pay per use solutions. SYSTEM MANAGEMENT AND SECURITY User Access Provide the flexibility to support existing roles and responsibilities of your organization. User roles and access rights should be customizable and not force your organization to adopt a specific workflow or team makeup. Active Directory Integration System Audit/Logging System Dashboard/Application Management System Communication and Security Protocol Automated Notification Framework Workflow User Interface Web Enabled Support full Active Directory integration to allow for centralized ID management and authentication. Provide a very rich set of audit and logging reports to determine user activity at a specific date and time. This logging should severely restrict access and serve as valid input into establishing chain of custody as well as determination of who has what access for user management activities. Allow for quick and effective assessment of the application s health, including disk space, RAM utilization and network connectivity. Support intra-component authentication through use of 802.1x certificates or other authentication factor commensurate with your organizations standards. User of the organizations certificate hierarchy should also be an available option. The security feature should be aimed at preventing unauthorized use of the system or system components. If possible the communication and security protocol should have thirdparty validation to limit your need to validate as the end user. Customized notifications through should be available. These notifications should support a more effective use of time by those involved in day to day operations. Automated notification based on user roles can make notification of pending tasks (approvals and other workflow activity) a very robust and auditable event. System workflow should support full delegation of duties without forcing an organization to adopt an inefficient process. Workflow steps should be clearly broken out and allow for tasks to be input into the system without undue burden on multiple parties. Further customization to fields within the user interface should support organization requirements and changes. Preferably leverages web browser technology with minimal need for third-party complex add-ons or installation of native application for viewing certain file types. This allows for an access anywhere capability while being lightweight from a resource and IT management perspective. User Interface Dual Screens Review panes must be interchangeable and support dual screens for efficiency and user preference. AccessData EDRM Buyers Guide 2011

15 APPLICATION PLATFORM AND USER INTERFACE Application Platform Support Should make full use of current technology including 64-bit operating systems, clustering technologies, true multi-threading and various OS versions. As data volumes grow, the need to make use of these and other platforms will grow. Hardware Support User Interface Application should not have limitations on number or size of RAM or CPU. Application should be as agnostic as possible to support existing standards and needs to scale as case and legal matters dictate. Application should be lightweight, flexible and allow for remote access. Application should support both the novice and experienced user and require minimal training to operate. Performance Scalability Metrics should be evaluated for large data sets. While a comprehensive list is beyond the scope of this document, suggestions include (processing times per/gb, per/tb, time to open a document in review panel, time to export GB or TB of data, time to render (TIFF/PDF) GB or TB of documents, etc.) Solution should have the ability to scale to meet the geographic, network and workload demands of your organization. Solution should further support peak processing and or collection requirements. Thoroughly test and scrutinize your vendor(s) for the extremes. Assume your current workload and organization structure will grow exponentially over time. Your solution should not require material reinvestment to meet growth requirements. EDRM IDENTIFICATION The identification phase includes development of a plan, as well determination of sources for potentially relevant ESI Custodian Tracking Data Mapping Pre-Collection Audit Capability Structured Data Connectors Addition of potentially relevant custodians should be a very straight forward process. Addition should include ability to add from external sources like Active Directory. Historical custodian detail should be readily accessible to understand what other cases/matters that custodian was involved in and what data was collected in conjunction with that matter. Data should include custodian , phone numbers, business unit, case and other pertinent workflow details. System should have the ability to record and update potentially relevant data repositories, such as PCs, systems, SharePoint, archiving systems, other structured data repositories, without additional expense or complexity of a third-party provider. This information should be readily available to serve as input into the planning phase of the case. System should have the capability to run search criteria against a potentially relevant target and provide results without actually copying the underlying files. A pre-collection audit capability is much faster than solutions that have to pull data back to index and report on potential search criteria. This can be a key advantage especially early in a case or when tight deadlines are approaching. System and network impact is also minimized, as well as elimination of the overhead in storing extraneous data for early case assessment activities. This capability will continue to grow in significance as organization data and grows in size and complexity. Integrated collection capability should be included as part of the overall systems without additional cost of introducing a third-party tool or process. Complexity of e-discovery activity need not be complicated with additional vendors or unnecessary procedures. At a minimum integration should be offered for your organization s system, but others may include Microsoft Exchange Lotus Notes Microsoft SharePoint Oracle URM FileNet (IBM) Documentum (EMC) Opentext Symantec Enterprise Vault AccessData EDRM Buyers Guide 2011

16 EDRM PRESERVATION This phase includes prompt isolation and notification to appropriate parties that data must be protected in a way that is legally defensible; reasonable; proportionate; efficient; auditable; broad but tailored and ultimately mitigates risks. Integrated Litigation Hold System should include integrated litigation hold functionality. Integration provides the benefit of centralized management of all your custodians. It also eliminates the complexity and cost of introducing a distinct system into the IT environment for the sole purpose of lit hold. Lit Hold Progress Tracking Lit hold should include immediate and up-to-the-minute progress tracking of all status within the matter, including custodians and IT-specific managers or data owners. Electronic and hard copy reports should be available for internal and external parties. Lit Hold Approval System should support a workflow approval sequence for attorney and paralegal review when necessary. Lit Hold Customization The lit hold system should have a rich set of customization features, including templates to introduce efficiency. Distribution and management of attachments should be managed within the lit hold interface. There should also be the capability to include custodian interview questions with feature for responses. EDRM COLLECTION This phase includes acquisition of potentially relevant electronically stored information (ESI). Collection should typically include both the document/file, as well as any associated metadata. Forensic Collection Capability Though not required by the courts, a forensic collection does ensure your collection methodology is legally defensible and infers a level of auditability not present with non-forensic solutions. Forensic collection is no longer the domain of law enforcement and is rapidly becoming a term understood and sought by opposing counsel and the courts. Forensic collection capability also provides the additional protection of collecting deleted files, which can occasionally be called into scope. Collect Open Files Collection solution must have the ability to collect open files. Tools that fail to meet this critical criteria fall short of being legally defensible and leave organizations open to charges of incomplete preservation. Full Disk Image Acquisition Targeted Collection Capability Advanced Collection Options In some instances, a full disk image may be the most prudent collection methodology, especially when a collection window is short or case specifics dictate (criminal, etc.). At a minimum, the collection solution should offer a fully defensible solution to remotely acquire a full forensic disk image for secondary investigation or in-house processing. Disk acquisition should allow for both logical and physical identification and collection. Collection tool should have a full spectrum of collection criteria for both inclusion and exclusion to include the following: 1. Keywords (with full set of operands) 2. File extensions 3. File type (internal file identification) 4. File dates (accessed, modify, create, etc) 5. File path 6. File size 7. MD5 hash 8. Archive search (ability to search and collect from compressed file types) These filter criteria should allow for combination to further reduce false positives and increase proportionality when collecting data. Occasionally advanced collection options may be required by opposing counsel or the courts. Some of these unique requirements may be worth evaluating: 1. Collect deleted files 2. Search slack or unused disk space 3. Search hidden system files 4. Collect files that are missing a file extension 5. Collect encrypted files AccessData EDRM Buyers Guide 2011

17 Collection Logging and Reporting Incremental Collection Capability Multi-Source Collection Ability to Collect from Sources Outside the Corporate Firewall Bandwidth and Resource Throttling At a minimum to support chain of custody and to present a legally defensible collection solution reports should include: 1. Non-responsive files report (list of all files which did not meet search criteria and were therefore not collected) 2. Report describing the collection criteria w/associated hit counts, data sources, legal matter, as well as custodians involved. These search hit reports should maintain the structure of complex search terms. 3. List of all collected files, name, type, source and size Additional suggested reporting criteria includes: 1. A real-time status report for each collection target providing current file and time to completion 2. A summarized report of the entire collection and all associated statuses and targets Solution should offer the ability to collect all modified or newly created data since the date of last acquisition. This is particularly critical for lengthy matters or matters that have a large number of mobile custodians. Solution should support multiple sources for a single collection. This could be organized by custodian or particular data platform. Increasingly organizations have more and more potential custodians located offsite and are outside of the corporate network. The chosen e-discovery solution should offer the ability to remotely collect data regardless of network location or domain membership. Most organizations have a separate reporting responsibility and set of concerns when it comes to network and resource utilization. There should be a robust and valid throttling capability to limit network and resource impact when acquiring data during peak utilization periods or where available network bandwidth comes at a premium. Collection Templates Templates for routine or standard collection approaches should be available to improve efficiency and reduce the chances for errors. Agent Architecture Deployment of collection agents or service should be lightweight, compatible with existing deployment infrastructure and NOT require a complete reinstallation to accommodate new features or software updates. NOTE: A vendor claiming their collection solution does not require an agent or service should be heavily scrutinized. A thorough proof of concept should be run to ensure data is not being dropped or missed (open files, system files, large files, etc.) during collection. EDRM PROCESSING This phase typically includes indexing, itemization and some level of data identification within the subject data universe. Processing is always conducted on data which has been collected in the preceding phase. Processing Performance Processing Diligence A great deal of marketing dollars has been spent on claims related to data processing speeds (e.g. TB/day). The reality is most of these claims are made using systems which can run in the $100k USD. That s the investment prior to any licensing fees. Solution should easily and affordably scale using existing hardware to meet peak or increased processing demands. Vendors that are unwilling to spend the time educating you on their processing performance scalability should be avoided. Again, the best advice here is to run a thorough POC and make sure you understand any service level objectives within your organization. This single criterion carries the most variance across e-discovery vendors and unfortunately carries the biggest risk. Because processing happens under the hood, data can be missed and that undetected data is usually not reported to end users. Deficiencies in many vendors processing capabilities include the lack of extensive exception handling and reporting, as well as QA/QC methodologies. The only way to assess a product s processing performance and accuracy is to do a side-by-side comparison of competing technologies. Criteria should include: 1. Processing / presentation of embedded objects (aka OLE streams) in MS Office documents and other files 2. Nested s 3. attachments 4. Duplicate file identification 5. Call-outs or comments in MS Excel and MS Word documents 6. Embedded formulas 7. Full processing/indexing of large (GB+) files AccessData EDRM Buyers Guide 2011

18 8. Older file types (typical for e-discovery) 9. Media files 10. Metadata, metadata, metadata Create a representative data set, run it through the competing tools and perform a side-by-side analysis. Then do it again with the same dataset. You will be surprised by the results. Optical Character Recognition (OCR) Text Extraction Processing should include steps to process all image type documents and provide searchable text during subsequent e-discovery phases. Processing sequence should include full text extraction of all documents and to provide for a quick and expedient search during subsequent e-discovery phases. Encrypted File Support Deduplication Options While not necessarily restricted to the processing step, support for encrypted files and disk security technology should be included if they apply to your organization. Popular technologies include: 1. Microsoft s Encrypted Files System (EFS) 2. Lotus Notes NSF and File level encryption 3. Credent (full disk encryption) 4. Safeboot (full-disk encryption) The message here is to simply understand your environment and take care in evaluating your solution so roadblocks are identified early in the vendor assessment phase. Application should support a full range of deduplication (identification of exact duplicates) options, including but not limited to: 1. Duplicate file at the Case or Custodian level 2. Deduplicate at the Case or Custodian level with options for a. To: b. From: c. CC: d. Bcc: e. Subject: f. Sent/Received time g. Attachment count h. Hash (body or attachment) Duplicate identification should be flagged with reports available to note what documents/ are duplicates with associated counts. EDRM ANALYSIS While this phase appears in the EDRM after Review, the practical application of Analysis should be prevalent throughout all phases. For purposes within this guide we have chosen to represent Analysis as the Early Case Assessment and Early Data Assessment activity. Keyword Culling Pre-defined Filters Application should have an efficient and effective method for analyzing and reducing the subject corpus of data down to a manageable subset, using keyword and keyword variations. At a minimum filter criteria should include the following 1. Stemming 2. Phonic 3. Synonym 4. Related 5. Fuzzy 6. Multi-word 7. Boolean Inclusive filters should offer in-document hit highlighting and keyword counts. Pre-defined filters should be available within the review interface for efficient culling of irrelevant files or simply to better understand the overall dataset. Pre-defined filters should include, but are not limited to: 1. Encrypted Files 2. Decrypted Files 3. Duplicate Files 4. Graphics 5. fields (To:, From:, Subject, etc.) 6. Custodians Analysis Reporting and Metrics Analysis and reporting of the ECA/EDA phase should simply be able to quantify (what and how many) documents DID and DID NOT meet search criteria. These reports and metrics are critical input to further AccessData EDRM Buyers Guide 2011

19 Discussion (thread) Support Additional Evidence Data/Evidence Bookmarks Security Audit Report development of overall case strategy, as well as additional collection steps. Reporting should further be able to quickly determine if chronological or conceptual gaps exist in the current data set. Application should support a dedicated view of data that allows for a contextual understanding of the chain of communication, including parties involved and subjects. This view should further support an easily navigable interface to sort according to any variety of fields including, but not limited to: 1. To: (CC:, Bcc:) 2. From: 3. Subject: 4. Domains 5. Display Name 6. Date Sent 7. Date Received 8. with attachments 9. with replies Support for easily adding data to current review set should be available at any point during the analysis or review phase. Complete reprocessing of data should not be required to add new evidence and assign to a specific matter and custodian. Bookmarks should be available at the global and case level to support data organization and analysis for operations in bulk. While a good deal of time is spent in securing data once it has been collected, a minimal amount of time is spent understanding who and what has interacted with the data once it enters the Analysis and Review phases. Sensitivity and concerns over disclosure are no less relevant further downstream in the EDRM, in fact it is likely that a greater number and less controlled team is conducting Review and Analysis. Therefore we are strong advocates for a thorough reporting function that clearly illustrates who viewed what data and when. The report should include the user, case, action taken and data object of reported action. EDRM REVIEW This phase is generally conducted by an attorney or other skilled practitioner and is intent on sub-categorizing documents in a cost effective and efficient manner. The overall objectives are to identify relevant facts, further refine case strategy and to reduce risk to the client. User Interface Intuitive Security Permissions Redactions and Tagging/Coding Bulk Tagging/Coding User interface should be relatively intuitive for the novice user, while offering advanced features for those performing unique case requirements. There should be a balance between ease of use and lacking the functionality to solve the business problem completely with a single tool. Application security should support the ability to limit access to redactions, documents and tags to specific application roles or audiences. These permissions should be configured easily at any point in the review cycle. Tagging of document families, large search results or threads should be supported to expedite review. Unicode Support Duplicate Management Application should support viewing and searching of foreign languages, including conversion and export into Review platform load files and hard copy output. 1. Duplicate coding is consistent across custodians and includes redactions 2. As new data is added existing coding/redactions are auto applied Redaction Support Text Highlighting Persistent Redactions should be supported and include text overlay, as well as custom color schemes. Redactions should appear transparent when performing review. Redactions should offer the ability to be burned in with text. Hits from previously executed searches should remain highlighted across , attachments and loose files. Support for customized highlighting during review for marking privilege, attorney names and search terms. Near-Native Document Viewer Documents should be viewable in near-native context within a single interface without requiring the native application. This speeds review time and significantly reduces cost and installation complexity. AccessData EDRM Buyers Guide 2011

The Business Case for ECA

The Business Case for ECA ! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean

More information

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

Symantec ediscovery Platform, powered by Clearwell

Symantec ediscovery Platform, powered by Clearwell Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow

More information

Veritas ediscovery Platform

Veritas ediscovery Platform TM Veritas ediscovery Platform Overview The is the leading enterprise ediscovery solution that enables enterprises, governments, and law firms to manage legal, regulatory, and investigative matters using

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Sample Electronic Discovery Request for Proposal

Sample Electronic Discovery Request for Proposal [COMPANY LOGO] Sample Electronic Discovery Request for Proposal Table of Contents OVERVIEW... 3 IMPORTANT CONSIDERATIONS FOR VENDOR SELECTION... 3 SECTION A: COMPANY PROFILE... 4 SECTION B: SCHEDULE &

More information

The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery.

The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery. The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery. Legions of law firms and legal service professionals have been well served by industry s original software programs

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

Amazing speed and easy to use designed for large-scale, complex litigation cases

Amazing speed and easy to use designed for large-scale, complex litigation cases Amazing speed and easy to use designed for large-scale, complex litigation cases LexisNexis is committed to developing new and better Concordance Evolution capabilities. All based on feedback from customers

More information

Enhancing Document Review Efficiency with OmniX

Enhancing Document Review Efficiency with OmniX Xerox Litigation Services OmniX Platform Review Technical Brief Enhancing Document Review Efficiency with OmniX Xerox Litigation Services delivers a flexible suite of end-to-end technology-driven services,

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

LexisNexis Concordance Evolution Amazing speed plus LAW PreDiscovery and LexisNexis Near Dupe integration

LexisNexis Concordance Evolution Amazing speed plus LAW PreDiscovery and LexisNexis Near Dupe integration LexisNexis Concordance Evolution Amazing speed plus LAW PreDiscovery and LexisNexis Near Dupe integration LexisNexis is committed to developing new and better Concordance Evolution capabilities. All based

More information

Whitepaper: Enterprise Vault Discovery Accelerator and Clearwell A Comparison August 2012

Whitepaper: Enterprise Vault Discovery Accelerator and Clearwell A Comparison August 2012 888.427.5505 Whitepaper: Enterprise Vault Discovery Accelerator and Clearwell A Comparison August 2012 Prepared by Dan Levine, Principal Engineer & Miguel Ortiz, Esq., ediscovery Specialist Globanet 15233

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Developed by Orange Legal Technologies, Providers of the OneO Discovery Platform. Considering Third Generation

More information

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions AccessData Group CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions White Paper "#$%&'()'*+&*+, Overview... 1 Top 5 Communications Company: Background and Its ediscovery Requirements...

More information

Understanding How Service Providers Charge for ediscovery Services

Understanding How Service Providers Charge for ediscovery Services ediscovery SERVICES Understanding How Service Providers Charge for ediscovery Services The objective of this document is to briefly define the prominent phases of the ediscovery lifecycle, the fees associated

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013 MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??

More information

Are you ready for more efficient and effective ways to manage discovery?

Are you ready for more efficient and effective ways to manage discovery? LexisNexis Early Data Analyzer + LAW PreDiscovery + Concordance Software Are you ready for more efficient and effective ways to manage discovery? Did you know that all-in-one solutions often omit robust

More information

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools. THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the

More information

Early Data Assessment. Product Summary. Processing. Review

Early Data Assessment. Product Summary. Processing. Review Early Data Assessment Gain early insight into your case data without waiting days for processing Defensibly reduce document collections by up to 95% Eliminate unnecessary time and expenses prior to formal

More information

ediscovery 5.3 and 5.3.1 Release Notes

ediscovery 5.3 and 5.3.1 Release Notes ediscovery 5.3 and 5.3.1 Release Notes Document Date: 4/7/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

AD ediscovery +INTUITIVE +ROBUST +CONSISTENT +SECURE

AD ediscovery +INTUITIVE +ROBUST +CONSISTENT +SECURE AD ediscovery +INTUITIVE +ROBUST +CONSISTENT +SECURE AD ediscovery brings IT and Legal teams together like never before, in a single, fully integrated platform for enterprise-wide search, collection, systemized

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

What s Happening with Summation? FAQs

What s Happening with Summation? FAQs What s Happening with Summation? FAQs WHY? Why did AccessData choose Summation over competing products, such as Concordance or CaseLogistix? Actually that is a fairly difficult question to answer, because

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

T E C H N O L O G Y B R I E F. The Highly Efficient ediscovery Process

T E C H N O L O G Y B R I E F. The Highly Efficient ediscovery Process The Highly Efficient ediscovery Process AccessData and Summation January 2011 The volatile ediscovery space has seen many acquisitions over the past several years. Some of them worked; many did not. Some

More information

Document Storage Tips: Inside the Email Vault

Document Storage Tips: Inside the Email Vault Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360,

More information

exobase Discovery Review Platform

exobase Discovery Review Platform exobase Discovery Review Platform EXPERIENCE Over 20 years of knowledge and experience utilizing technology to provide knowledge management solutions for legal teams and organizations. VALUE Pride is taken

More information

ediscovery 6.0 Release Notes

ediscovery 6.0 Release Notes ediscovery 6.0 Release Notes Document Date: 10/13/2015 2015 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this release.

More information

Portable. Harvester 4.0 has Arrived!! POWERFUL E-DISCOVERY COLLECTION SOFTWARE SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL HARVESTER FEATURES

Portable. Harvester 4.0 has Arrived!! POWERFUL E-DISCOVERY COLLECTION SOFTWARE SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL HARVESTER FEATURES Portable Defensible Automated E-Discovery Collection Harvester 4.0 has Arrived!! SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL Incomplete and undocumented electronic discovery collections occur every

More information

for Insurance Claims Professionals

for Insurance Claims Professionals A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Litigation Support. Learn How to Talk the Talk. solutions. Document management Document management solutions Litigation Support glossary of Terms Learn How to Talk the Talk Covering litigation support from A to Z. Designed to help you come up to speed quickly on key terms and concepts,

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

The World Leader in ediscovery & Digital Investigations. EnCase ediscovery

The World Leader in ediscovery & Digital Investigations. EnCase ediscovery The World Leader in ediscovery & Digital Investigations EnCase ediscovery Enforce legal holds and automatically search, identify, collect, preserve and process electronically stored information across

More information

Unified ediscovery Platform White Paper @LEGAL DISCOVERY, LLC. www.legaldiscoveryllc.com info@legaldiscoveryllc.com 1-877-215-9508

Unified ediscovery Platform White Paper @LEGAL DISCOVERY, LLC. www.legaldiscoveryllc.com info@legaldiscoveryllc.com 1-877-215-9508 Unified ediscovery Platform White Paper @LEGAL DISCOVERY, LLC www.legaldiscoveryllc.com info@legaldiscoveryllc.com 1-877-215-9508 Benefits of a Unified ediscovery Platform Litigators have often used technology

More information

Discovery in the Digital Age: e-discovery Technology Overview. Chuck Rothman, P.Eng Wortzman Nickle Professional Corp.

Discovery in the Digital Age: e-discovery Technology Overview. Chuck Rothman, P.Eng Wortzman Nickle Professional Corp. Discovery in the Digital Age: e-discovery Technology Overview Chuck Rothman, P.Eng Wortzman Nickle Professional Corp. The Ontario e-discovery Institute 2013 Contents 1 Technology Overview... 1 1.1 Introduction...

More information

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review Litigation Solutions insightful interactive culling distributed ediscovery processing powering digital review TECHNOLOGY ASSISTED REVIEW Eclipse combines advanced analytic technology with machine learning

More information

What Am I Looking At? Andy Kass

What Am I Looking At? Andy Kass Concordance Tip Sheet August 2013 What Am I Looking At? Andy Kass Discovery is the process of requesting, producing and gleaning documents to substantiate assertions of fact in a case. Review is a deep,

More information

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS NE X TPOINT.C O M @NE X TPOINT Aided by the sensible use of technology, small firms should no longer be averse to taking on big cases or processing

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments

Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce

More information

ILM et Archivage Les solutions IBM

ILM et Archivage Les solutions IBM Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance

More information

ARCHIVING FOR EXCHANGE 2013

ARCHIVING FOR EXCHANGE 2013 White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver

More information

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS KYLE ALEXANDER, and DYLAN SYMINGTON, on behalf of themselves and all those

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

Review Easy Guide for Administrators. Version 1.0

Review Easy Guide for Administrators. Version 1.0 Review Easy Guide for Administrators Version 1.0 Notice to Users Verve software as a service is a software application that has been developed, copyrighted, and licensed by Kroll Ontrack Inc. Use of the

More information

Clearwell Legal ediscovery Solution

Clearwell Legal ediscovery Solution SOLUTION BRIEF: CLEARWELL LEGAL ediscovery SOLUTION Solution Brief Clearwell Legal ediscovery Solution The Challenge: Months Delay in Ascertaining Case Facts and Determining Case Strategy, High Cost of

More information

ediscovery Technology That Works for You

ediscovery Technology That Works for You ediscovery Technology That Works for You Peace of Mind for Serious ediscovery ediscovery demands options, and having one of the industry s most comprehensive portfolios of proprietary and best-of-breed

More information

ediscovery Solutions

ediscovery Solutions The Radicati Group, Inc. www.radicati.com ediscovery Solutions A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright November 2010, Reproduction Prohibited 9:30 am, PT November 4, 2010

More information

2972 NW 60 th Street, Fort Lauderdale, Florida 33309 Tel 954.462.5400 Fax 954.463.7500

2972 NW 60 th Street, Fort Lauderdale, Florida 33309 Tel 954.462.5400 Fax 954.463.7500 2972 NW 60 th Street, Fort Lauderdale, Florida 33309 Tel 954.462.5400 Fax 954.463.7500 5218 South East Street, Suite E-3, Indianapolis, IN 46227 Tel 317.247.4400 Fax 317.247.0044 Presented by Providing

More information

Litigation Solutions insightful interactive culling distributed ediscovery processing powering digital review

Litigation Solutions insightful interactive culling distributed ediscovery processing powering digital review Litigation Solutions i n s i g h t f u l i n t e r a c t i ve c u l l i n g d i s t r i b u t e d e d i s cove r y p ro ce s s i n g p owe r i n g d i g i t a l re v i e w Advanced Analytical Review Data

More information

PICTERA. What Is Intell1gent One? Created by the clients, for the clients SOLUTIONS

PICTERA. What Is Intell1gent One? Created by the clients, for the clients SOLUTIONS PICTERA SOLUTIONS An What Is Intell1gent One? Created by the clients, for the clients This white paper discusses: Understanding How Intell1gent One Saves Time and Money Using Intell1gent One to Save Money

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and

More information

APPENDIX B TO REQUEST FOR PROPOSALS

APPENDIX B TO REQUEST FOR PROPOSALS Overview and Instructions APPENDIX B The service provider s responsibilities will include the following: (A) Processing of ESI produced to CTAG in a variety of file formats; (B) Hosting ESI produced to

More information

EDiscovery Q@A. The table below is a guideline of the data that is expected to be presented by the WCB as the initial source.

EDiscovery Q@A. The table below is a guideline of the data that is expected to be presented by the WCB as the initial source. EDiscovery Q@A Question 1: In our initial review of the RFP we have some questions around the data volumes. Can you confirm the data volumes are correct? We are questioning the validity of the total data

More information

All-Inclusive ediscovery Pricing White Paper

All-Inclusive ediscovery Pricing White Paper All-Inclusive ediscovery Pricing White Paper Discovery was once a relatively straightforward process. Interrogatories, document exchanges and depositions took place based on information found in accordion

More information

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director Background Olivia Gerroll, ediscovery Solutions Group Director Over sixteen years of experience in litigation

More information

INDEX. OutIndex Services...2. Collection Assistance...2. ESI Processing & Production Services...2. Computer-Based Language Translation...

INDEX. OutIndex Services...2. Collection Assistance...2. ESI Processing & Production Services...2. Computer-Based Language Translation... SERVICES INDEX OutIndex Services...2 Collection Assistance...2 ESI Processing & Production Services...2 Computer-Based Language Translation...3 OutIndex E-Discovery Deployment & Installation Consulting...3

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014 Best Practices: Litigation Document Management Applying The Latest Lexbe ediscovery Platform Features and Functionality for Fast and Collaborative Reviews and Productions September 18, 2014 Stu Van Dusen

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

Perfecting Advanced Rendering ADLIB PDF PRODUCT GUIDE

Perfecting Advanced Rendering ADLIB PDF PRODUCT GUIDE Perfecting Advanced Rendering ADLIB PDF PRODUCT GUIDE Contents Capability Highlights... 3 How We re Different... 3 Deployment Options... 3 Embedded in Your Software... 3 In Your Department... 4 As a Shared

More information

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 1 The E-Discovery How-To Guide: Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 2 Table

More information

A Modern Approach for Corporations Facing the Demands of Litigation

A Modern Approach for Corporations Facing the Demands of Litigation A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and

More information

Vancouver Toronto Seattle

Vancouver Toronto Seattle Company Profile litigation support services Consulting Project Management Electronic Discovery Document Hosting Computer Forensics Database Re-engineering Trial Support leadership Searchlight is a full-service

More information

Early Case Assessment in ediscovery

Early Case Assessment in ediscovery WHITE PAPER: EARLY CASE ASSESSMENT IN EDISCOVERY........................................ Early Case Assessment in ediscovery Who should read this paper Lawsuits, corporate investigations, and regulatory

More information

Matter Management for Legal Departments Essential Features to Maximize Your Return on Investment

Matter Management for Legal Departments Essential Features to Maximize Your Return on Investment White Paper Matter Management for Legal Departments Essential Features to Maximize Your Return on Investment Author: Matt Ryan, Senior Consultant Contents Introduction...1 System Scalability and Reliability...2

More information

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure June 11, 2015 Stu Van Dusen Lexbe LC ediscovery Webinar Series Info Future Takes Place Monthly Cover a Variety of Relevant

More information

Best practices for comparing apples to apples in e- discovery pricing and services

Best practices for comparing apples to apples in e- discovery pricing and services Best practices for comparing apples to apples in e- discovery pricing and services A real- world case study of how six service providers priced the same hypothetical matter with wildly varying results.

More information

How To Write A Request For Information (Rfi)

How To Write A Request For Information (Rfi) Request for Information No. 15-200-ACCO Litigation Hold & ediscovery Tool Posting Date: November 14, 2014 Event Timeline: This Request for Information (RFI) is issued by Washington State Department of

More information

AccessData Corporation

AccessData Corporation AccessData Corporation Using AccessData Lab to Perform Complete ediscovery Processing While Mitigating Risk: A Guide Providing Assurance and Protocol to Third-party EDD Providers White Paper Contents Introduction...

More information

A Radicati Group Webconference

A Radicati Group Webconference The Radicati Group, Inc. www.radicati.com A Radicati Group Webconference 9:30 am, PT November 3, 2011 The Radicati Group, Inc. Copyright November 2011, Reproduction Prohibited The Radicati Group, Inc.

More information

Five Steps to Ensure a Technically Accurate Document Production

Five Steps to Ensure a Technically Accurate Document Production Five Steps to Ensure a Technically Accurate Document Production by Elwood Clark Lawyers spend a lot of time focusing on the legal aspects of a document production, including properly defining the scope

More information

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011 W H I T E P A P E R Symantec Enterprise Vault and Exchange Server 2010 November 2011 Introduction... 3 Enterprise Vault Support and Compatibility for Exchange Server 2010... 3 So What Is New In Exchange

More information

Quick Reference Guide

Quick Reference Guide Quick Reference Guide What s New in NSi AutoStore TM 6.0 Notable Solutions, Inc. System requirements Hardware Microsoft Windows operating system (OS) running on computer with at least a 2 GHz Processor

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

ediscovery AND COMPLIANCE STRATEGY

ediscovery AND COMPLIANCE STRATEGY ONE EASILY AVOIDABLE PITFALL IN YOUR ediscovery AND COMPLIANCE STRATEGY As the mobile workforce continues to grow and more data gets generated outside of the datacenter, bringing that endpoint data into

More information

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street

More information

ediscovery Journal Report: Digital Reef & BlueArc ediscovery Software Performance Benchmark Test

ediscovery Journal Report: Digital Reef & BlueArc ediscovery Software Performance Benchmark Test ediscovery Journal Report: Digital Reef & BlueArc ediscovery Software Performance Benchmark Test ediscoveryjournal was engaged to review the testing methodology, execution, and results of the Digital Reef

More information

Datosphere Platform Product Brief

Datosphere Platform Product Brief Datosphere Platform Product Brief No organization is immune to the explosive growth in the volume of electronically stored information (ESI). The rapid growth of ESI is having a tangible impact upon organizations

More information

electronic discovery requests

electronic discovery requests Making and responding to electronic discovery requests By Martin Felsky and Peg Duncan One of the significant impacts of electronic discovery on litigation is the way in which it reconfigures the adversarial

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite

Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite LEGAL CASE STUDY Solomon Renowned Law Firm Reduces Cost and Risk by Moving from Legacy Software to AccessData E-Discovery Suite By: Introduction Solomon is a San Diego-based law firm that has provided

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

LONG INTERNATIONAL. Long International, Inc. 10029 Whistling Elk Drive Littleton, CO 80127-6109 (303) 972-2443 Fax: (303) 972-6980

LONG INTERNATIONAL. Long International, Inc. 10029 Whistling Elk Drive Littleton, CO 80127-6109 (303) 972-2443 Fax: (303) 972-6980 LONG INTERNATIONAL Long International, Inc. 10029 Whistling Elk Drive Littleton, CO 80127-6109 (303) 972-2443 Fax: (303) 972-6980 www.long-intl.com TABLE OF CONTENTS INTRODUCTION... 1 Why Use Computerized

More information

Electronic Medical Records Issues with Discovery of e-medical Records in Litigation

Electronic Medical Records Issues with Discovery of e-medical Records in Litigation Electronic Medical Records Issues with Discovery of e-medical Records in Litigation Presented to Illinois State Bar Association // May 4, 2012 E-Medical Records / Today s Agenda The Golden Rule E-Discovery

More information

PDF Primer PDF. White Paper

PDF Primer PDF. White Paper White Paper PDF Primer PDF What is PDF and what is it good for? How does PDF manage content? How is a PDF file structured? What are its capabilities? What are its limitations? Version: 1.0 Date: October

More information