Download presentation
Presentation is loading. Please wait.
Published byTyler Eaton Modified over 9 years ago
1
Allvision Computing Protocol Training Day
2
Collection – Getting started Introduction to the marketplace Introduction to the marketplace Who are the vendors Who are the vendors What are the products What are the products What can a provider do for you What can a provider do for you Allvision Computing
3
The EDRM Model
4
Guide(s) to eDisclosure Allvision Computing
5
The UK eDisclosure Marketplace Consultancy Firms (Large) Consultancy Firms (Large) Consultancy Firms (Medium) Consultancy Firms (Medium) Software Specific Software Specific Solutions / Bureaus Solutions / Bureaus Forensic Services Forensic Services
6
Allvision Computing Litigation Support Tools FTK Guidance EnCase Clearwell Nuix Digital Reef IPRO Index Engines LAW Kofax Home Brew Relativity Ringtail Equivio Relevance Case Logistix Concordance ICONECT Merrill Lextranet AccessData Consilio DocuMatrix eTrium Integreon Tools Ontrack Advanceview & Inview Recommind Accelerate Suite Stroz software Viewpoint ZyLAB Systems Opus 2 – Magnum Merrill Systems PDF Bundling Software (e.g. Zylpha)
7
Allvision Computing Protocol Training Day
8
Processing and Reducing Coding, clustering, email threading, key word filters Coding, clustering, email threading, key word filters De-duplication – concept and reality De-duplication – concept and reality Allvision Computing
9
A mixture of software Allvision Computing The following slides are based on software / screenshots taken from a large number of vendors and products The following slides are based on software / screenshots taken from a large number of vendors and products If you attempted to cobble this lot together you'd probably end up like this guy If you attempted to cobble this lot together you'd probably end up like this guy Technology makes a good servant, but is a bad master.
10
Allvision Computing Processing
11
Allvision Computing Basic Workflow Initial Volume Process Refine Review Filter Remove unwanted files( CAD/JPEG/.exe files)Remove unwanted data( Amazon/Facebook/Admin) Filter Who / What / When( Custodians/Keywords/Dates) Filter
12
Allvision Computing What have I got?
13
Allvision Computing Language Identification
14
Allvision Computing Keyword Analysis
15
Allvision Computing De-Duplication The premise - Each ESI item is finger-printed and then all the fingerprints are compared, any duplicates are removed. The premise - Each ESI item is finger-printed and then all the fingerprints are compared, any duplicates are removed. Reality – Can be technical issues, particularly with using time to create the algorithm. Work with your supplier to understand the issues. Reality – Can be technical issues, particularly with using time to create the algorithm. Work with your supplier to understand the issues. Hash Algorithm X
16
Allvision Computing The trouble with Metadata In House Litigation support department passed data and images. In House Litigation support department passed data and images. Electronic information collected by either client or external vendor. Electronic information collected by either client or external vendor. ESI turned into Tiffs for disclosure exchange. ESI turned into Tiffs for disclosure exchange. Only images exchanged, no OCR or metadata. Only images exchanged, no OCR or metadata.
17
Allvision Computing The trouble with Metadata March 9, 2009
18
Allvision Computing Basic Workflow Initial Volume Process Refine Review Filter Remove unwanted files( CAD/JPEG/.exe files)Remove unwanted data( Amazon/Facebook/Admin) Filter Who / What / When( Custodians/Keywords/Dates) Filter
19
Allvision Computing Unwanted Files - 1
20
Allvision Computing Unwanted Files - 2 Remove unwanted file types
21
Allvision Computing Unwanted Files - 3
22
Allvision Computing Unwanted Data Select the type of email we want to look at
23
Allvision Computing Case Focus Select the people we want
24
Allvision Computing Basic Workflow Initial Volume (20,696) Process (11,337) Refine (5,677) Review (245) Filter Remove unwanted files( CAD/JPEG/.exe files)Remove unwanted data( Amazon/Facebook/Admin) Filter Who / What / When( Custodians/Keywords/Dates) Filter
25
Allvision Computing Additional Tools Filter Images Visualise EmailsAssess Volumes
26
Allvision Computing Clustering – An Overview
27
Allvision Computing Clustering Client had 33,000 documents to review (about 330 lever arch files). Client had 33,000 documents to review (about 330 lever arch files). Average review = 200 docs/day Average review = 200 docs/day 33,000 divide by 200 = 165 review days 33,000 divide by 200 = 165 review days Paralegal @ £100/hour = £700/day Paralegal @ £100/hour = £700/day Rough review cost = £115,000 Rough review cost = £115,000
28
Allvision Computing Clusters 33,000 documents reduced to 11,000
29
Allvision Computing Clustering Costs 33,000 documents = 100,000 pages 33,000 documents = 100,000 pages 15p/page to scan & OCR = £15,000 15p/page to scan & OCR = £15,000 Process and host the data for 3 months = £5,000 Process and host the data for 3 months = £5,000 11,000 documents = 55 review days = £38,500 11,000 documents = 55 review days = £38,500 Total cost = £58,500 Total cost = £58,500
30
Allvision Computing Clustering Comparison £58,000£115,000 55165 Time (Days) Cost Without With A third of the time at half the cost
31
Allvision Computing Protocol Training Day
32
Review and Analysis Searching / Keywords Searching / Keywords Hit Highlighting Hit Highlighting Review logic / workflow Review logic / workflow Email threads Email threads Email Visualisation Email Visualisation Near Duplicates Near Duplicates Auto translation Auto translation Allvision Computing
33
Initial Review
34
Allvision Computing Detailed Review
35
Allvision Computing General Search (Key Words)
36
Allvision Computing Hit Highlighting
37
Allvision Computing Review Logic Rules Before you can put the document back into the main store check to see it has been coded as: 1)It is Relevant AND is one of 3 states: a)If Fully Privileged, all the correct coding is there b)If Part Privileged, it has a redaction as well as all the correct coding. c)Is set as Not Privileged. 2)OR It is not Relevant AND does not have any Privileged status set. 3)OR has no Relevance status as it has been categorised as a kind of ESI we wish to filter out.
38
Allvision Computing Unknown Messages are where the system has identified an email that is part of the thread but the native file is not present (missing or deleted). You can still read the content of these emails within the inclusive email Green Emails with an orange star are ‘inclusives’ and contain all of the contents of the previous emails. Attachments are also green meaning that you should review them too. Email Threads
39
Allvision Computing Email Visualisation
40
Allvision Computing Near Duplicates
41
Allvision Computing Audio Searching
42
Allvision Computing Automatic Translation
43
Allvision Computing Protocol Training Day
44
Exchange and Inspection - Data Delivery Practical differences between Native, PDF and Image renditions of a document Practical differences between Native, PDF and Image renditions of a document Effect of redactions upon format of exchange Effect of redactions upon format of exchange Cost implications / rolling production / media Cost implications / rolling production / media Listing of Privileged documents Listing of Privileged documents Allvision Computing
45
Practical Differences Allvision Computing Images (with OCR)PDF's (with Text)Native Unitise images Cluster Objective Code Subjective Code Keyword Search Redact + Email threads Email Visualisation Near Duplicates Auto translation Hit Highlighting + CAR Audio search Social media Cluster + De-NIST Clustering Filter by type, date & custodian Email analysis Objective Code Subjective Code Keyword Search Redact Hit Highlighting
46
Native Documents – The Issues Allvision Computing Page: 1 of 32
47
Exchange and Inspection - Data Delivery Effect of redactions upon format of exchange Effect of redactions upon format of exchange Cost implications / rolling production / media Cost implications / rolling production / media Listing of Privileged documents Listing of Privileged documents Allvision Computing Make sure your software lets you separate out a Privileged attachment from the rest of the email "family". Recent versions of some packages allow this, older ones don't, check with your vendor.
48
Allvision Computing Protocol Training Day
49
Presentation Major Enquiry Software Major Enquiry Software PDF Bundles PDF Bundles On-line Systems On-line Systems Allvision Computing
50
PDF Bundles Allvision Computing
51
Presentation Systems Allvision Computing Build a trial bundle Documents Links created on loading Individual Highlighting Individual Comments Group / Individual messages Transcripts Annotations Audio
52
Allvision Computing Protocol Training Day
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.