13 YEARS 11/2000 – 11/2013 Automated Privilege Detection, Email De-Threading & Automated Priv Logs 1st Quarter 2014 Confidential.

Slides:



Advertisements
Similar presentations
Collections Management Software for Museums and Archives r e d i s c o v e r y s o f t w a r e. c o m O V E R V I E W P R E S E N T A T I O N.
Advertisements

Time Matters Document Management
Micro Control Solutions Stability System II rev. 6.4
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Case Study By: Susan Gulick Principal Consultant – Solutions Partners, Inc. May 18, 2005 Oracle Self-Service HR.
ProQuest Databases The ProQuest Databases: What are They? ProQuest databases allow users to search for citations, abstracts, and full-text and full-image.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Welcome 2013 User Group Meeting Voting on New Features.
ACT! 2008 (10.0) Product Tour for ACT! 2007 (9.0) Users.
Classroom User Training June 29, 2005 Presented by:
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
OCLC Online Computer Library Center Kathy Kie December 2007 OCLC Cataloging & Metadata Services an introduction.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
THE ISTOG FORUM Member Gateway to Inservice Testing Related Operating Experience and More! Presenter: Jeff Neyhard.
Solving document management issues for over 30 years Bob Hawley (800) x140 Welcome to Metafile Information.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Valora BlackCat: An Introduction to Data Visualization & Hosting Thursday, May 26, :00 pm ET Sandra Serkes, President & CEO Valora Technologies,
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Beyond Predictive Coding – The True Power of Analytics.
Data Mining for Expertise: Using Scopus to Create Lists of Experts for U.S. Department of Education Discretionary Grant Programs Good afternoon, my name.
Architecture Review 10/11/2004
13 YEARS 11/2000 – 11/2013 Valora Records Management & Information Governance (RMIG) Specific Customer Example: Brand Integrity / Product Liability.
Data Mining Documents for Corporate Legal
Monday, July 24, :00 pm ET Sandra Serkes, President & CEO
Internet Made Easy! Make sure all your information is always up to date and instantly available to all your clients.
SEARCH ENGINE OPTIMIZATION
Utilizing Technology to Interpret, Classify & Data Mine Documents
How AutoIndexing Works The Steps before BlackCat Data Visualization
Program Management Portal (PgMP): What’s New in R8 for the Client
13Text Ltd Phone Broadcast.
Getting the Most out of your Patricia Installation
Student Debt Solutions
GO! with Microsoft Office 2016
Overview of MDM Site Hub
BASIC INFORMATION ABOUT DATABASE MANAGEMENT SOFTWARE
FAQ Maintenance.
GO! with Microsoft Access 2016
Template library tool and Kestrel training
SEARCH ENGINE OPTIMIZATION
Customer Overview & Training For Viewing by Customers
Description of Revision
Best in Class CRM for Law Firms
5.8 Presentation.
CAR Phase 22 Release Notes
Housing application Presented by Phil Callaghan MD Caltech CRM
Extended Document Management System (EDMS)
INTAKE OF NEW PORTFOLIO AND INVOICES
Elements of Database System
IDA CRM and Project Management
Data Quality By Suparna Kansakar.
Core Platform The base of EmpFinesse™ Suite.
FAQ Maintenance.
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Saravana Kumar CEO/Founder - Kovai Atomic Scope – Product Update.
Sr. Quality Engineering Manager,
This is the Sign In page for the Dashboard
SupportCenter Plus Product Overview.
The ultimate in data organization
Onboarding Webinar 13 April 2019 Presented by and.
CAD DESK PRIMAVERA PRESENTATION.
End User and SU training
Using Microsoft Outlook: Outlook Support Number
ProQuest Databases.
About Quick Base Technical notes
Sample Assessment & Governance Results
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Registering a systematic review on PROSPERO
SAP Enable Now Web Assistant content strategy
Presentation transcript:

13 YEARS 11/2000 – 11/2013 Automated Privilege Detection, Email De-Threading & Automated Priv Logs 1st Quarter 2014 Confidential

Current PrivLog Process Issues Priv Logs too cumbersome to create, edit, monitor and maintain Myriad email formats complicate efforts to systematize and automate Constant re-scripting and/or screen-scraping not viable Each matter is different, with unique requirements PrivLogs requiring “heroic,” non-sustainable and costly efforts to clients Turn times severely impacted Ever-tighter court deadlines threatening existing workflow models Available resources are maxed out PrivLog volumes only likely to increase exponentially More PrivLogs per matter More matters More listings per PrivLog

Valora Solution: Automated PrivLogs Using PowerHouse Utilize PowerHouseTM capabilities Email De-threading Auto Unitization Auto Coding Names, Dates, Subject/Title, etc. Name & Content Normalization Auto Priv Detection Utilize BlackCatTM Data Visualization Decision approval & audit

Ongoing Monthly Process Support all PrivLog creation, monitoring, auditing and production for Litigation groups 20+ PrivLogs per month 5,000+ Entries per PrivLog Fully automated Intake, Processing, Hosting & Production Multi-matter, multi-user, multi-format

Understanding the Whole Process Priv Log Overview Valora creates a fully-featured PrivLog of privileged documents to be produced during litigation. Full listing of all withheld documents, including Author, Recipient, CC/BCC, Title, Date and Reason for withholding (if desired) Links to native or processed documents (if desired) De-Threading Overview Email De-Threading separates threaded emails into individual documents, associated by attachment range. The original email document becomes a linked set of resultant email documents. Separates out unique conversation strings and mark only those that are privileged as such. Prevents the accidental (and inaccurate) marking of an entire email chain as privileged when it is not. Automated Privilege Detection Valora’s PowerHouse software identifies potentially privileged documents through Rules-Based Technology-Assisted Review techniques. This minimizes time and effort involved in the review process, providing a fast, cost-effective and consistent way to identify and single-out privileged information.

Determining Privilege PowerHouse follows a set of predefined Rules to determine whether or not the document is Presumptively Privileged Determinations for multiple Privileges Attorney-Client Attorney Work Product Trade Secret Personal Identification Information Non-Relevance Out of Date Range Custom Automated Redaction for sensitive information Automated Privilege Log

How it Works Determining Privilege ANALYSIS/RULES Litigation Document Review Manual Determining Privilege The document should be marked Presumptively Privileged if any of the following conditions are present: Content is communication between attorney and client about the matter in question, within the specified date range. Is a design document or graphic that shows the specific protocol for handling simultaneous voice and data actions Mentions attorney actions, plans, communications or intentions related to the case matter. And so on… Rule: Attorney-Client Privilege When: [FullText] contains any of <Matter Descriptors List> and [Author, Recipient, CC/BCC] contains any of <AttorneyList 4> and [ClientList] and is a communication Doctype [Email, Fax, Letter, Text, Memo…], and Date is between [Date Range], … Rule: Trade Secret Privilege When: Any document in the Attachment Family matches: [FullText] contains any of <Patent '009 key phrase list 4>, or Parent of Attachment Family matches: Any of [Author, Recipient, CCs] contains any of <Patent '009 experts contact list 23>, … Rule: Work Product Privilege When: [FullText] contains (fuzzy match) any of <Case Team>, or Any of [Inside Counsel List 9], and [FullText] contains (fuzzy match) any of <Key Topics>, … -7-

Automated PrivLog Creation PowerHouse AutoIndexing AutoBusinessRules Analytics Database Prep Emails are de-threaded into component “stringlets” Each stringlet is Autocoded Coding for each stringlet is extracted to the PrivLog Emails enter the system as concatenated email threads

De-Threading Example: Original email string of two pages, four emails 3 1 4 total emails 2 CONFIRM0122692 (Page 1 of record) CONFIRM0122693 (Page 2 of record)

Resulting Document 1 (After De-Threading & Redacting) <- New email 1 CONFIRM0122692.001 1st email is now only email on the page. All other documents have been redacted out. New Bates number reflects 1st child status. CONFIRM0122692

Resulting Document 2 (After De-Threading & Redacting) CONFIRM0122692.002 CONFIRM0122693.001 2nd email is now only email on the page. 2nd email is a 2 page document. All other documents have been redacted out. New Bates numbers reflect 2nd child status AND 2 page record.

Resulting Documents 3 & 4 (After De-Threading & Redacting) 3rd email is now the only email on the page. All other documents have been redacted out. New Bates number reflects 3rd email in document status. (2nd email on page). 4th email is now only email on the page All other documents have been redacted out. New Bates number reflects 3rd email in document status (2nd email on page). CONFIRM0122693.002 CONFIRM0122693.003

Overview of Solutions for Privilege Logs & De-Threading Unitization & De-Threading – Extract individual emails from threads and provide logical attachment ranges. Near Duplicate Detection – Detect and label near-duplicates across dataset. Basic Bibliographic Coding – Begin ID, End ID, Author, Recipient, Copyees/BCC, Date, Document Type and Title (verbatim). Presumptive Privilege Determination – Detect and label various forms of privilege Redaction – Removal or blackbar of sensitive information Automated Privilege Log – Automated, detailed listing of bibliographic information from withheld documents Data Visualization & Hosting – Secure, web-based hosting of documents, coded fields, text, reports and Privilege Logs Professional Services - Full, 24x7 managed support for all projects and clients

Valora Technologies, Inc. Thank You! For More Information: Valora Technologies, Inc. 101 Great Road, Suite 220 Bedford, MA 01730 781.229.2265 www.valoratech.com info@valoratech.com