eDiscovery Implementation

We set up and run challenging local and multi-jurisdictional eDiscovery projects.

We identify the right balance of in-house and externally managed support across your eDiscovery process and advise you at every step. We assist you to allocate internal and external personnel, incorporating your chosen process with a suitable technology solution.

Information management

Information management aims to effectively deal with the rising volume and diversity of information and the associated risks, costs and complications.

This ensures the success of an eDiscovery project by providing:

  • Fast implementation of eDiscovery protocols for collecting and preserving electronically stored information (ESI).
  • Quick and reliable identification of potentially relevant data sources.
  • Substantial cost savings by not having to process, review, and analyse irrelevant information.

Identification

We help our clients  find the best ways to plan and execute the successful identification of data by conducting interviews with business, legal, and IT stakeholders. This allows us to identify what types of relevant documents exist, how and where this data is stored and how best to interrogate IT systems to extract these documents in a forensically sound manner.

Early case assessment

We enable our clients to quickly identify the relevant information contained within the large document collections. This helps to gain more control over the process, while also significantly reducing data collections and lowering the processing costs.

Preservation

All information that fits the defined criteria needs to be preserved. Once the duty to preserve is triggered, it needs prompt isolation to protect potentially relevant data in a legally defensible, reasonable, proportionate, efficient, and auditable way. At the same time, the approach must be tailored to mitigate risks.

We understand the important procedures, methodologies, and tools needed to successfully preserve all documents and associated metadata.

Collection

The task of collecting ESI must be performed in a forensically sound manner and adhere to the collection plan agreed in advance by the parties involved. Having quality control (QC) features in place is also important to verify the completeness and accuracy of the ESI collected.

Our consultants ensure that none of the preserved information becomes compromised.

Processing

Before data can be reviewed, it must be rendered viewable. 

To reduce the amount of data that flows into the processing and review stages, we combine the functionality of special processing platforms and best practices, in terms of quality control and validation routines, to ensure that all processing tasks have been performed to standard, in a reasonable time frame and without compromising the data or review process.

Analysis

Analysis aims to provide greater confidence in the accuracy of the review and identification process, as well as increase consistency of review and coding decisions.

We facilitate an analysis phase, to reduce the volume of documents that get pushed to review, or swiftly identify key documents at the outset.

Review

During this stage the data is reviewed, analysed, tagged, and redacted. Privilege and confidentiality logs are prepared. We utilize methods such as technology assisted review (a.k.a predictive coding), concept searches, and email cluster review.

Production

The type of production will vary based on the requirements and parameters of the agreed criteria. Depending on the type of production several technical issues are likely to crop up, requiring customized data-handling tasks and alternative tools to ensure that productions are prepared, quality-checked, and delivered in a timely fashion.