Data Processing & Discovery Hosting
Our data processing system has been refined and mastered through many years of experience. We know all the steps it takes to get you what you need. We know each data processing situation is unique so, before we begin, we consider four key elements of your case: scope, exposure, budget, and deadlines. By factoring in these elements, we provide accurate, detailed and thorough data processing. Data processing includes but is not limited to the follow steps: data preparation, early case assessment, data culling, deduplication, process reporting and risk analysis.
- Consultative assessment of data-set, with intent to cull data based on scope, exposure, budget and deadlines.
- Preserve metadata
- Early Case Assessment (ECA)
- Data Culling (keywords/phrases, domain tally, dates, custodians, other fielded data)
- Process reporting and exception logs
- QC and risk analysis
- Export data to hosting platform
- Data preparation
- Back-up restoration
- Email format conversion and data normalization
- De-duplication
- DeNIST
- Full text indexing
- Optical character recognition (OCR)
Our hosting and review tool affords secure and defensible access to a web-based review tool that is accessible through any browser. Through this tool, you have access to advanced searching, data isolation, privilege logs, redactions, pin-citing & notations, user-metrics’ reporting, file tracking and much more. Each user interface can be customized to the project needs, and the review features and permissions are fully-scalable on a user basis.
eDiscovery Support
- Web-based review tool, accessible with any browser
- Secure and defensible access
- Advanced searching – text, metadata, emails & attachments
- Data isolation and coding
- Privilege/Exception Logs
- Batching and user metrics’ reporting
- Redactions, Highlights and Endorsements (bates labeling)
- Comments and Pinciting
- Analytics and Prognostic (predictive) Coding
- Near duplication
- Email Threading
- Concept Clustering
- File tracking, administrative access and user auditing
- Fully scalable and no long term commitment