e-discovery Forensic Services kpmg.ch Advisory

Similar documents
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. DECEMBER 2013

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

HOBS OVERVIEW INTRODUCTION

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics Services

IBM ediscovery Identification and Collection

What You Should Know About ediscovery

Deloitte Discovery Caribbean & Bermuda Territory Guide

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

APPENDIX B TO REQUEST FOR PROPOSALS

Neil Meikle, Associate Director, Forensic Technology, PwC

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Viewpoint ediscovery Services

E-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix

KPMG Forensic Technology Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Enhancing Document Review Efficiency with OmniX

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

IBM Unstructured Data Identification and Management

A Modern Approach for Corporations Facing the Demands of Litigation

Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents

Discovery Data Management

Symantec ediscovery Platform, powered by Clearwell


Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

EMC SourceOne Management and ediscovery Overview

Meeting E-Discovery Challenges with Confidence

KPMG Enterprise- Level Electronic Discovery. kpmg.com

ediscovery Technology That Works for You

Electronic Discovery

Predictive Coding Defensibility and the Transparent Predictive Coding Workflow

INDEX. OutIndex Services...2. Collection Assistance...2. ESI Processing & Production Services...2. Computer-Based Language Translation...

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.

This Webcast Will Begin Shortly

The ediscovery Balancing Act

Guide to advanced ediscovery solutions

The Clearwell ediscovery Platform

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

The Business Case for ECA

From Chaos to Clarity.

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Sample Electronic Discovery Request for Proposal

e-discovery Forensics Incident Response

COMPONENT TECHNOLOGIES FOR E-DISCOVERY AND PROTOTYPING OF SUIT-COPING SYSTEM

Sean Byrne Head of ediscovery Solutions Michael Lappin Director of Archiving Technology

Integration of E-Discovery and FOIA

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review

Predictive Coding Defensibility and the Transparent Predictive Coding Workflow

Purpose: To ensure that e-discovery Requests and Litigation Hold Notices are received, routed and responded to in a timely and thorough manner.

Document Storage Tips: Inside the Vault

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

exobase Discovery Review Platform

Software-assisted document review: An ROI your GC can appreciate. kpmg.com

For Your ediscovery... Software

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

ediscovery Solutions

Deloitte Forensic. Deloitte Forensic. Capability Statement

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

E- Discovery in Criminal Law


REDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - PRIORITIZATION FOR 100% REVIEW. Bill Tolson Sr. Product Marketing Manager Recommind Inc.

Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014

Transcription:

e-discovery Advisory Forensic Services kpmg.ch

e-discovery You or your client are involved in a dispute, investigation, regulatory or internal review. You need to review evidence and may need to disclose material to an opponent, investigator or regulator. There is potentially a huge amount of evidence in e-mails, chats or other electronic documents on laptops, e-mail servers, back up tapes and databases. KPMG Forensic can help you to navigate the maze of information and focus quickly and cost-effectively on the most relevant material. The volume of data generated by business operations is enormous, is enormous and it is mainly driven by the proliferation of e-mail and other electronic business systems. When these systems become subject of a dispute, regulatory or internal investigation, preserving, processing and producing this data can present a significant challenge. Our e-discovery methodology, of which our Forensic Data Centre (FDC) and our CYBERLAB (Forensic and Security Lab) is a key component, has been designed to support the capture, processing and review of electronic and paper evidence irrespective of volume. Experience has shown that this can help to increase the efficiency and effectiveness of this process. We can help you to capture, process and review large volumes of critical material in multiple formats and locations. Our typical e-discovery management methodology follows five stages: Stage 1 Plan Stage 2 Collect Stage 3 Process Stage 4 Review / Analysis Stage 5 Disclose Identify scale and objectives of project and challenges faced. Formulate a practical and appropriate plan. Identify custodians and location of the relevant data. Capture and protect paper and electronic evidence. Focus on key data through data-culling methods and removing irrelevant information. Apply advanced document analytics (predictive coding and other technology-assisted review techniques). Transfer data to internal or external hosting environment. Provide review application for efficient data analysis. Record the reviewer s work on document management application. Disclose documents to relevant parties (produce list and bundles).

We can help you to capture, process and review large volumes of data in different formats and multiple locations. Our e-discovery management methodology Stage 1 Plan Identify scale and objectives of project and challenges faced Formulate practical and proportionate plan Stage 2 Collect Identify custodians and location of their data Capture and protect paper and electronic evidence Stage 3 Process Focus on key data by de-duplication and discarding obviously irrelevant material Apply advanced document analytics (date, keyword searching) Project management, coordination and control Key characteristics of our service Project management: experienced project management to help throughout the process. Security: multiple layers of security and a high level of encryption means that access can be rigorously controlled. Accessibility: the data can be accessed at any time, by any number of users, from any location, using any computer with Internet access. Advanced tools: data can be reviewed using state of the art software such as Relativity, Clearwell, Nuix etc. and sophisticated document analytics technology. Subject-matter experts: our inhouse reviewers have the relevant industry experience to digest the technical jargon and efficiently find relevant documents. Searchability: rapid key-word searching which can help to identify relevant documents, and also assist with any necessary redaction. Scaleable solutions: there is no practical limit to the volume of data we can manage. Tailored workflow: our methodology and applications allow structured review processes such as categorisation of documents according to relevance, privilege status or topic. Audit trail: full audit trail and chain of custody sufficient to meet standards of proof in criminal courts. Collaboration: project teams can share new discoveries and ideas through annotations and circulation of documents. Flexibility: we can tailor our approach according to the size and specific needs of the project.

We can tailor our approach according to the size and specific needs of the project. Our Solutions Stage 4 Review/ Analysis Transfer data to internal/external hosting environment Provide review application Ongoing feedback and liaison Document analytics Let the data speak Once the data has been filtered for relevance, it may still be too large to be reviewed effectively. Concept mapping applications and predictive coding techniques such as Relativity, NUIX, Clearwell and other EDM tools help to focus on relevant material quickly by searching documents for specific nouns or concepts. As demands can change, the tools are flexible enough to enable the reviewer to focus on emerging issues of interest. Stage 5 Disclose Record the reviewer s work on document management application Disclose documents to relevant parties (produce list and bundles) They can also map social networks to identify which individuals have been corresponding with each other, and on what issues. With the power to process and categorise thousands of documents very swiftly, these tools represent the future of document review. On Premise Many investigative, litigation and dispute matters require data or other electronically stored information (ESI) to remain under full control of the client s premises. Our mobile e-discovery solutions are scalable and designed to support your team onsite using industry-leading technology. KPMG s secured data room in Zurich We have a dedicated data room which can be booked for investigative, litigation and dispute matters. All e-discovery data will be hosted in our highly secured CYBERLAB. You don t have to care about how to convert your meeting rooms into secure investigation areas and your investigation. Your investigation can take place in a neutral environment. e-discovery -Hosting We are able to host all your e-discovery data centrally in our secured and Swiss based forensic data center. Only authorized individuals will be able to securely access their case data by using state-of-the-art security technologies (like RSA-token). Your benefit: You can easily access your case from your office desk over the Internet using the Internet Explorer.

Global evidence collection We were engaged by a large multinational corporation in relation to proceedings overseas valued in hundreds of millions of US dollars. The client was required to collect and review electronic evidence located around the globe, and to disclose relevant documents to its opponents. Working closely with the client and its lawyers, we devised and executed a detailed project plan to collect data in 17 countries taking into account data privacy limitations in individual jurisdictions. This involved collecting and processing data from over 300 individuals amounting to in excess of 25 terabytes of data (about 1.5 billion pages). This project involved over 100 forensic technology and other professionals, led by the UK firm working alongside KPMG s global network. Dealing with foreign character sets We were instructed by a leading law firm in relation to a cross-border dispute valued in millions of US dollars. We were asked to host data and provide an application to enable reviewers around the world to review and search many millions of pages of data, the majority of which was in non-latin character sets, a potentially significant problem. To meet these requirements, we recommended the use of AttenexTM to provide concept mapping and advanced language capabilities. This allowed the legal teams to search and review the documents in non-latin character sets in a much faster, more focused and cost-effective way than they would otherwise have been able to. Post-administration investigation As part of an investigation into the administration of a European group of companies, evidence was captured from 35 PC s, 100 back up tapes (including e-mail servers) and over 30,000 lever arch files. Through intelligent searching and filtering, 400,000 relevant documents were identified. The investigation team 50 people based in several law firms and KPMG offices across a number of locations used an online review application to access, search, filter and analyse the data. Important documents were identified and used to support reports, interviews and settlement discussions. This helped to speed up the investigation process and enabled the team to access data concurrently without needing to distribute huge volumes of paper. Our e-discovery service includes: Project management of the engagement from project planning through to document production. Recovery and analysis of electronic evidence. Intelligent data processing including the elimination of duplication and the extraction of meta data ( hidden data underlying electronic documents). Concept mapping applications to help improve the efficiency of the review. Web-based review facilities available across multiple jurisdictions for identification and review of key documents. In-house, subject-matter expert reviewers experienced in several industries (banking, pharmaceuticals, insurance).

Contact KPMG AG Badenerstrasse 172 PO Box 8036 Zurich kpmg.ch Philippe Fleury Partner Head Forensic +41 58 249 37 53 pfleury@kpmg.com Gerben Schreurs Partner Forensic +41 58 249 48 29 gschreurs1@kpmg.com Jörg Ochsner Manager Forensic +41 58 249 47 89 joergochsner@kpmg.com The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received, or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. 2016 KPMG AG is a subsidiary of KPMG Holding AG, which is a member of the KPMG network of independent firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss legal entity. All rights reserved. e-discovery March 2016