SlideShare a Scribd company logo
1 of 8
eDiscovery Visual Identification …  NO SURPRISES
How We Do It The Identification Gap Big Hole? “Identifying the relevant custodians upfront has far-reaching effects on a legal case. I am frankly surprised no-one has built technology to aid this critical process.”  Ken Leissler, Protiviti
Identification – the problem How We Do It Org Charts and Interviews currently determine people close to the   matter in question ,[object Object]
Did we miss anyone?     … from within the group?      … from another department or group?      … contractors (not on org chart)?      … from outside the company? So how do you defensibly get identification right without over-collecting?
Introducing… Visual Identification …  NO SURPRISES Visual Early Case Intelligence The only defensible way to get identification right
Visual Identification How We Do It We answer 2 primary identification questions: ,[object Object]
Did you miss anyone?Identify ALL the custodians, first time Establish who is key (prioritization) Uncover unexpected custodians Visualize how people are connected
The Problem Use Case 26f conference preparation –   product liability Our client is a Fortune 500 company and were preparing their defense for an alleged product liability case. The collection initially centered on a specific group responsible for the product in question.  The plaintiff requested the collection of 100 custodians. Catelas was able to quickly  demonstrate that only 15 custodians were relevant to this case. More importantly, Catelas identified 5 new custodians (not previously considered), who were central to the case. One was a contractor (not on org chart). In fact, the Catelas analysis not only helped reduce and refine the scope of discovery, but provided leading intelligence from the contractor’s emails that greatly impacted thecourse of actiontaken by our client.

More Related Content

Viewers also liked (15)

G. Yuen: We Need Chinese Teachers! (T4)
G. Yuen: We Need Chinese Teachers! (T4)G. Yuen: We Need Chinese Teachers! (T4)
G. Yuen: We Need Chinese Teachers! (T4)
 
Short case...Neuro-Behcet
Short case...Neuro-BehcetShort case...Neuro-Behcet
Short case...Neuro-Behcet
 
Wollen Sie das VORSCHAUEN? YP-S3 #.1
Wollen Sie das VORSCHAUEN? YP-S3 #.1Wollen Sie das VORSCHAUEN? YP-S3 #.1
Wollen Sie das VORSCHAUEN? YP-S3 #.1
 
Cadenas tróficas y ciclos biogeoquímicos
Cadenas tróficas y ciclos biogeoquímicosCadenas tróficas y ciclos biogeoquímicos
Cadenas tróficas y ciclos biogeoquímicos
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Remix 4 p ke 4a
Remix 4 p ke 4aRemix 4 p ke 4a
Remix 4 p ke 4a
 
Procesal penal - x
Procesal penal - xProcesal penal - x
Procesal penal - x
 
Publishers forum2010deutsch
Publishers forum2010deutschPublishers forum2010deutsch
Publishers forum2010deutsch
 
Soc345 lect7 religion
Soc345 lect7 religionSoc345 lect7 religion
Soc345 lect7 religion
 
пётр 1
пётр 1пётр 1
пётр 1
 
загадочный титан
загадочный титанзагадочный титан
загадочный титан
 
Comparative Methods In Social Sciences
Comparative  Methods In  Social  SciencesComparative  Methods In  Social  Sciences
Comparative Methods In Social Sciences
 
It's All About Community
It's All About CommunityIt's All About Community
It's All About Community
 
Educació Salut Tutoria
Educació Salut TutoriaEducació Salut Tutoria
Educació Salut Tutoria
 
DSA_Canopy_Report
DSA_Canopy_ReportDSA_Canopy_Report
DSA_Canopy_Report
 

Similar to Catelas Visual Identification for eDiscovery

Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value leadershipmgtservice
 
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...Healthegy
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge Katherine Bird
 
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...Intersection Conference
 
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...Chief Analytics Officer Forum
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachFinancial Poise
 
Conducting Effective Workplace Investigations
Conducting Effective Workplace InvestigationsConducting Effective Workplace Investigations
Conducting Effective Workplace InvestigationsParsons Behle & Latimer
 
Devil’s Advocate: A Methodology to Improve Competitive Intelligence
Devil’s Advocate: A Methodology to Improve Competitive IntelligenceDevil’s Advocate: A Methodology to Improve Competitive Intelligence
Devil’s Advocate: A Methodology to Improve Competitive IntelligenceDr. Avner Barnea
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowingNeha Singh
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesBusiness Controls, Inc.
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Stanford University
 
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxChapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxcravennichole326
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 

Similar to Catelas Visual Identification for eDiscovery (20)

The Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower EssayThe Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower Essay
 
Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value
 
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...
Breakout Session: Is Off-Label Promotion Lawful After the Howard Root/Vascula...
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge
The Financial Times Innovative Lawyers – Global Legal Hackathon Challenge
 
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...
Intersection18: From a "Simple" App Challenge for Astronauts to an Enterprise...
 
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...
State Farm presentation at the Chief Analytics Officer Forum East Coast USA (...
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Conducting Effective Workplace Investigations
Conducting Effective Workplace InvestigationsConducting Effective Workplace Investigations
Conducting Effective Workplace Investigations
 
Group Interview Paper
Group Interview PaperGroup Interview Paper
Group Interview Paper
 
Devil’s Advocate: A Methodology to Improve Competitive Intelligence
Devil’s Advocate: A Methodology to Improve Competitive IntelligenceDevil’s Advocate: A Methodology to Improve Competitive Intelligence
Devil’s Advocate: A Methodology to Improve Competitive Intelligence
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docx
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace Issues
 
DeepFakes H4D Stanford 2019
DeepFakes H4D Stanford 2019DeepFakes H4D Stanford 2019
DeepFakes H4D Stanford 2019
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
 
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docxChapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
Chapter 12 Duties as a WhistleblowerWhistleblowerA whis.docx
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 

More from Rob Levey

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?Rob Levey
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?Rob Levey
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based SecurityRob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsRob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance ReviewsRob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales SuccessRob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & LitigationRob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal InvestigationsRob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment TrapRob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative SellingRob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case AnalyticsRob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your peopleRob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & InvestigationsRob Levey
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarRob Levey
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 

More from Rob Levey (20)

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Catelas Visual Identification for eDiscovery

  • 2. How We Do It The Identification Gap Big Hole? “Identifying the relevant custodians upfront has far-reaching effects on a legal case. I am frankly surprised no-one has built technology to aid this critical process.” Ken Leissler, Protiviti
  • 3.
  • 4. Did we miss anyone? … from within the group? … from another department or group? … contractors (not on org chart)? … from outside the company? So how do you defensibly get identification right without over-collecting?
  • 5. Introducing… Visual Identification … NO SURPRISES Visual Early Case Intelligence The only defensible way to get identification right
  • 6.
  • 7. Did you miss anyone?Identify ALL the custodians, first time Establish who is key (prioritization) Uncover unexpected custodians Visualize how people are connected
  • 8. The Problem Use Case 26f conference preparation – product liability Our client is a Fortune 500 company and were preparing their defense for an alleged product liability case. The collection initially centered on a specific group responsible for the product in question. The plaintiff requested the collection of 100 custodians. Catelas was able to quickly demonstrate that only 15 custodians were relevant to this case. More importantly, Catelas identified 5 new custodians (not previously considered), who were central to the case. One was a contractor (not on org chart). In fact, the Catelas analysis not only helped reduce and refine the scope of discovery, but provided leading intelligence from the contractor’s emails that greatly impacted thecourse of actiontaken by our client.
  • 10. Thank You Robert Levey 978 996 2758 robert.levey@catelas.com www.catelas.com

Editor's Notes

  1. Catelas is focusing on the far left hand side of the EDRM – Identification. We believe if you get identification right, first time, this has major implications for eDiscovery throughout the rest of the EDRM. Not least on Preservation and Collection.So what are the consequences of NOT getting it right?Legal Hold: clearly if you do not preserve all of the relevant custodians you run the risk of spoliation.26f: but equally, if you over-collect, not only does this drive up the scope and cost of litigation (throughout the EDRM), but strategically you are giving opposing counsel a wider net from which to search for evidence. Now obviously, no-one is deliberately trying to hide data from opposing counsel, but you are trying to limit the scope in line with proportionality. Having a defensible case for who and what should or should not be included, is key.Closer:One of our client’s, Ken Leissler, put it very eloquently – getting identification right has FAR REACHING effects on the entire legal process. While technology is being used to aid eDiscovery in virtually every other part of the EDRM, not so much for identification…. this area is more about “feel and touch”
  2. Current process:When we have asked our clients how do they identify custodians – for Preservation or further into Litigation – we always get the same answer - Org charts and Interviews. The identification typically starts with ‘who’ was close to the matter in question, which triggers a series of interviews to find out more.The Problem:This process is far from complete and exhaustive. In fact it is subject to significant gaps - how current is the org chart, is everyone on the org chart, do the people being interviewed remember all the players (if the matter goes back a few years). It is very easy to miss key people. Furthermore, this process does not reflect the way business is done in reality – the modern enterprise encourages cross-functional collaboration and social networking tools (twitter, facebook, etc) encourages {sometimes} social interaction at work. So business really does not happen in silo’s anymore.Closer:So is there a way to defensibly get identification right? To demonstrate a methodical process for identifying who to preserve or to reason for a narrower scope of collection?
  3. We believe there is…Catelas has introduced the Dynamic Business Org Chart (we do not call it a Social Org Chart) since people then think we are analyzing public social networks (like Facebook and LinkedIn). We are not – we mostly map email communications inside and outside of a company.This provides an up-to-date view of everyone in a company (including partners, customers and friends) and how they interact – ‘who knows who’, ‘how well’ and ‘what are they talking about’Why is this important – well we provide VISUAL EARLY CASE INTELLIGENCE based on a thorough understanding of who has relationships with Key Custodians, instantly alerting you to the non-obvious. For example, a key custodian may be the VP R&D. Our maps visualize all the relationships he shares inside and outside the company, including the fact that he has a very strong relationship with a Technical Contractor (who was not on the org chart) or a Marketing Intern (which seems odd) or with key people at the company suing our company for a Patent Infringement. We are taking a snapshot of the entire organization, not just a sample of the Key Custodian and the people immediately around him or her. And its based on real communications – literally every email communication, inside and outside the company. Comprehensive and defensible.In fact we believe it is THE ONLY defensible way to get identification right. We ELIMINATE SURPRISES.
  4. Let’s take you through how the process works in practise:Client engages with us either at Legal Hold or 26f stageClient provides us with their email Log Files (last 30 days) and/or 2-5 Key Custodian pst’s (or nsf’s)We answer 2 primary questions – who is involved AND did you miss anyone.We do this through a rigid methodology which we have actually borrowed from Law Enforcement and the way investigations are conducted in real life crime scenes.Identify ALL custodians – from 100% of the organization, not an assumed sample (eg one department)Prioritized list - who is most important versus least or (not) important based on relationshipsUnexpected or missing custodians – these are often referred to as “tangential custodians” and typically serve as an inter-mediary between two key custodians. In other works people in common who link two key custodiansVisualizations – a picture paints a thousand words – maybe more – our secret sauce is our ability to visualize what relationships look like and how people connect with one another. The non-obvious suddenly becomes obvious.
  5. I don’t expect you to read these use cases, but I will re-iterate some key points:-Key relationships map was able to prioritize the key custodians (85 custodians were NOT relevant) – saving over-collectionReduced scope and cost of collection/production request.Defensible methodology – documented and comprehensiveIdentified new, relevant custodians, including contractor (not on org chart)Found key case intelligence (from contractor’s emails) that swayed the outcome of the caseTurnaround – less than 48 hours