+ All Categories
Home > Documents > Protocol Training Day

Protocol Training Day

Date post: 25-Feb-2016
Category:
Upload: aglaia
View: 14 times
Download: 0 times
Share this document with a friend
Description:
Protocol Training Day. Collection – Getting started. Introduction to the marketplace Who are the vendors What are the products What can a provider do for you. The EDRM Model. Guide(s) to eDisclosure. The UK eDisclosure Marketplace. Consultancy Firms (Large) Consultancy Firms (Medium) - PowerPoint PPT Presentation
Popular Tags:
52
Allvision Computing Protocol Training Day
Transcript
Page 1: Protocol Training Day

Allvision Computing

Protocol Training Day

Page 2: Protocol Training Day

Collection – Getting started Introduction to the marketplace Who are the vendors What are the products What can a provider do for you

Allvision Computing

Page 3: Protocol Training Day

Allvision Computing

The EDRM Model

Page 4: Protocol Training Day

Guide(s) to eDisclosure

Allvision Computing

Page 5: Protocol Training Day

Allvision Computing

The UK eDisclosure Marketplace

Consultancy Firms (Large) Consultancy Firms (Medium) Software Specific Solutions / Bureaus Forensic Services

Page 6: Protocol Training Day

Allvision Computing

Litigation Support ToolsFTKGuidance EnCase

ClearwellNuixDigital ReefIPRO

Index EnginesLAWKofaxHome Brew

RelativityRingtailEquivio RelevanceCase LogistixConcordanceICONECTMerrill Lextranet

AccessDataConsilioDocuMatrixeTriumIntegreon ToolsOntrack Advanceview & InviewRecommind Accelerate SuiteStroz softwareViewpointZyLAB Systems

Opus 2 – MagnumMerrill Systems

PDF Bundling Software (e.g. Zylpha)

Page 7: Protocol Training Day

Allvision Computing

Protocol Training Day

Page 8: Protocol Training Day

Processing and Reducing Coding, clustering, email threading,

key word filters De-duplication – concept and reality

Allvision Computing

Page 9: Protocol Training Day

A mixture of software

Allvision Computing

The following slides are based on software / screenshots taken from a large number of vendors and products

If you attempted to cobble this lot together you'd probably end up like this guy

Technology makes a good

servant, but is a bad master.

Page 10: Protocol Training Day

Allvision Computing

Processing

Page 11: Protocol Training Day

Allvision Computing

Basic WorkflowInitial Volume

Process

Refine

Review

FilterRemove unwanted files ( CAD/JPEG/.exe files)

Remove unwanted data ( Amazon/Facebook/Admin)Filter

Who / What / When ( Custodians/Keywords/Dates)Filter

Page 12: Protocol Training Day

Allvision Computing

What have I got?

Page 13: Protocol Training Day

Allvision Computing

Language Identification

Page 14: Protocol Training Day

Allvision Computing

Keyword Analysis

Page 15: Protocol Training Day

Allvision Computing

De-Duplication The premise - Each ESI item is finger-

printed and then all the fingerprints are compared, any duplicates are removed.

Reality – Can be technical issues, particularly with using time to create the algorithm. Work with your supplier to understand the issues.

Hash Algorithm

Hash Algorithm

üX

Page 16: Protocol Training Day

Allvision Computing

The trouble with Metadata

In House Litigation support department passed data and images.

Electronic information collected by either client or external vendor.

ESI turned into Tiffs for disclosure exchange.

Only images exchanged, no OCR or metadata.

Page 17: Protocol Training Day

Allvision Computing

The trouble with Metadata

March 9, 2009

Page 18: Protocol Training Day

Allvision Computing

Basic WorkflowInitial Volume

Process

Refine

Review

FilterRemove unwanted files ( CAD/JPEG/.exe files)

Remove unwanted data ( Amazon/Facebook/Admin)Filter

Who / What / When ( Custodians/Keywords/Dates)Filter

Page 19: Protocol Training Day

Allvision Computing

Unwanted Files - 1

Page 20: Protocol Training Day

Allvision Computing

Unwanted Files - 2

Remove unwanted file types

Page 21: Protocol Training Day

Allvision Computing

Unwanted Files - 3

Page 22: Protocol Training Day

Allvision Computing

Unwanted Data

Select the type of email we want to

look at

Page 23: Protocol Training Day

Allvision Computing

Case Focus

Select the people we want

Page 24: Protocol Training Day

Allvision Computing

Basic WorkflowInitial Volume (20,696)

Process (11,337)

Refine (5,677)

Review (245)

FilterRemove unwanted files ( CAD/JPEG/.exe files)

Remove unwanted data ( Amazon/Facebook/Admin)Filter

Who / What / When ( Custodians/Keywords/Dates)Filter

Page 25: Protocol Training Day

Allvision Computing

Additional ToolsFilter Images

Visualise Emails Assess Volumes

Page 26: Protocol Training Day

Allvision Computing

Clustering – An Overview

Page 27: Protocol Training Day

Allvision Computing

Clustering Client had 33,000 documents to

review (about 330 lever arch files). Average review = 200 docs/day 33,000 divide by 200 = 165 review

days Paralegal @ £100/hour = £700/day Rough review cost = £115,000

Page 28: Protocol Training Day

Allvision Computing

Clusters

33,000 documents reduced to 11,000

Page 29: Protocol Training Day

Allvision Computing

Clustering Costs 33,000 documents = 100,000 pages 15p/page to scan & OCR = £15,000 Process and host the data for 3

months = £5,000 11,000 documents = 55 review days

= £38,500 Total cost = £58,500

Page 30: Protocol Training Day

Allvision Computing

Clustering Comparison

£58,000£115,00055165Time (Days)

Cost

Without With

A third of the time at half the cost

Page 31: Protocol Training Day

Allvision Computing

Protocol Training Day

Page 32: Protocol Training Day

Review and Analysis Searching / Keywords Hit Highlighting Review logic / workflow Email threads Email Visualisation Near Duplicates Auto translation

Allvision Computing

Page 33: Protocol Training Day

Allvision Computing

Initial Review

Page 34: Protocol Training Day

Allvision Computing

Detailed Review

Page 35: Protocol Training Day

Allvision Computing

General Search (Key Words)

Page 36: Protocol Training Day

Allvision Computing

Hit Highlighting

Page 37: Protocol Training Day

Allvision Computing

Review Logic RulesBefore you can put the document back into the main store check to see it has been coded as:

1) It is Relevant AND is one of 3 states: a) If Fully Privileged, all the correct

coding is thereb) If Part Privileged, it has a redaction as

well as all the correct coding.c) Is set as Not Privileged.

2) OR It is not Relevant AND does not have any Privileged status set.

3) OR has no Relevance status as it has been categorised as a kind of ESI we wish to filter out.

Page 38: Protocol Training Day

Allvision Computing

Unknown Messages are where the system has identified an email that is part of the thread but the native file is not present (missing or deleted). You can still read the content of these emails within the inclusive email

Green Emails with an orange star are ‘inclusives’ and

contain all of the contents of the previous emails. Attachments are also green meaning that you

should review them too.

Email Threads

Page 39: Protocol Training Day

Allvision Computing

Email Visualisation

Page 40: Protocol Training Day

Allvision Computing

Near Duplicates

Page 41: Protocol Training Day

Allvision Computing

Audio Searching

Page 42: Protocol Training Day

Allvision Computing

Automatic Translation

Page 43: Protocol Training Day

Allvision Computing

Protocol Training Day

Page 44: Protocol Training Day

Exchange and Inspection - Data Delivery

Practical differences between Native, PDF and Image renditions of a document

Effect of redactions upon format of exchange

Cost implications / rolling production / media

Listing of Privileged documentsAllvision Computing

Page 45: Protocol Training Day

Practical Differences

Allvision Computing

Images (with OCR) PDF's (with Text) Native

Unitise imagesCluster

Objective CodeSubjective CodeKeyword SearchRedact

+Email threadsEmail VisualisationNear DuplicatesAuto translation

Hit Highlighting

+CARAudio searchSocial media

Cluster+De-NISTClusteringFilter by type, date & custodianEmail analysis

Objective CodeSubjective CodeKeyword SearchRedact

Hit Highlighting

Page 46: Protocol Training Day

Native Documents – The Issues

Allvision Computing

Page: 1 of 32

Page 47: Protocol Training Day

Exchange and Inspection - Data Delivery

Effect of redactions upon format of exchange

Cost implications / rolling production / media

Listing of Privileged documents

Allvision Computing

Make sure your software lets you separate out a Privileged attachment from the rest of the email "family". Recent versions of some packages allow this, older ones don't, check with your vendor.

Page 48: Protocol Training Day

Allvision Computing

Protocol Training Day

Page 49: Protocol Training Day

Presentation

Major Enquiry Software PDF Bundles On-line Systems

Allvision Computing

Page 50: Protocol Training Day

PDF Bundles

Allvision Computing

Page 51: Protocol Training Day

Presentation Systems

Allvision Computing

Build a trial bundle

DocumentsLinks created

on loading

IndividualHighlighting

IndividualComments

Group / Individual messages

Transcripts

Annotations

Audio

Page 52: Protocol Training Day

Allvision Computing

Protocol Training Day


Recommended