The document discusses two scenarios for optimizing analytics workflows:
1) A scenario with 500,000 documents, a tight 30-day deadline, and limited resources where email threading could be used to prioritize inclusive emails for review.
2) Investigating a whistleblower tip about proprietary information leaks where searches filtered by date range and concept wheels per custodian may help expose relevant documents faster.
Groups are then asked to discuss workflows and features to optimize these scenarios and present their ideas. The document aims to share innovative analytics ideas to elevate common review workflows.
1. Work Like a Captain, Party
Like a Pirate: Ipro Analytics
2. Private and Confidential – Copyright 2019
Upping Your Analytics Game
Objective: Share innovative ideas
of how common workflows can be
elevated to new heights
3. Private and Confidential – Copyright 2019
Our Itinerary
1. We will explain the scenario and walk through a possible workflow (5 mins)
• What approach and workflow would you use for this scenario?
• What features would be most impactful in optimizing your workflow?
• How could it be more beneficial than the example?
2. You will work in your individual teams to come up with the following: (7 mins)
3. Each team will present your findings to the whole group (10 mins)
5. Private and Confidential – Copyright 2019
Scenario 1: Not Enough Time
You have:
• ~500,000 documents of mixed file types including several email PSTs and loose files
• 1 Subject Matter Expert
• 4 Reviewers
• 30 day discovery deadline to produce
Going into the review you already have:
• Keyword lists
• Date ranges
• List of potential privileged terms
• Clawback agreement
6. Private and Confidential – Copyright 2019
Scenario 1: Not Enough Time
You have:
• ~500,000 documents of mixed file types including several email PSTs and loose files
• 1 Subject Matter Expert
• 4 Reviewers
• 30 day discovery deadline to produce
Going into the review you already have:
• Key word lists
• Date ranges
• List of potential privileged terms
• Clawback agreement
One way to approach it:
- Run Email Threading on the case to
identify Inclusive emails
- Batch out only the Inclusive emails for
your four reviewers
- Apply Privilege terms and exclude hits
and families
7. Private and Confidential – Copyright 2019
Work in Groups (7 mins)
What
approach and
workflow would
you use for this
scenario?
What features
would be most
impactful in
optimizing your
workflow?
How could it
be more
beneficial than
the example?
8. Private and Confidential – Copyright 2019
Present Key Findings (10 mins)
What
approach and
workflow would
you use for this
scenario?
What features
would be most
impactful in
optimizing your
workflow?
How could it
be more
beneficial than
the example?
10. Private and Confidential – Copyright 2019
Investigating a tip from a Whistle Blower
You have:
• Documents and email archives from 100 different
employees in the same division as the whistle blower
• 1 Subject Matter Expert
• No specific timeline, but need ASAP to see if the firm
has been compromised and to guide next steps
Going into the review you have:
• Keywords associated with the investigation
• Some names of employees who might have been
involved
• A general timeline of when this information was
supposedly sent outside the company
A whistle blower indicated that some employees may be selling proprietary information to a competitor
11. Private and Confidential – Copyright 2019
Investigating a tip from a Whistle Blower
You have:
• Documents and email archives from 100 different
employees in the same division as the whistle
blower
• 1 Subject Matter Expert
• No specific timeline, but need ASAP to see if the
firm has been compromised and to guide next
steps
Going into the review you have:
• Key words associated with the investigation
• Some names of employees who might have been
involved
• A general timeline of when this information was
supposedly sent outside the company
A whistle blower indicated that some employees may be selling proprietary information to a competitor
One way to approach it:
- Create a search filtered by your approximate
date range
- Create a concept wheel per Custodian to look
for common topics
12. Private and Confidential – Copyright 2019
Work in Groups (7 mins)
What
approach and
workflow would
you use for this
scenario?
What features
would be most
impactful in
optimizing your
workflow?
How could it
be more
beneficial than
the example?
13. Private and Confidential – Copyright 2019
Present Key Findings (10 mins)
What
approach and
workflow would
you use for this
scenario?
What features
would be most
impactful in
optimizing your
workflow?
How could it
be more
beneficial than
the example?
Other approaches:
- Email Threading/Near Duplicate analysis and batch for review
- Use TAR pre-coded documents with seed set of known responsive docs
- Use key word “hits” and date range to form TAR review project
Produce documents resulting in 70% confidence level from TAR project
Run potentially privileged terms to Clawback any inadvertently produced privilege documents
The Ipro Approach:
- Key word search based upon known key words and criteria
- Batch most inclusive/unique results for review
- Create a concept wheel of the “non-hit” documents to see trends and key terms according to analytics
Other Approaches:
- Most Inclusive Emails to be reviewed
- ECA Filters paired with heatmap to see conversation occurrences
- Concept wheel per custodian or one combined wheel
- Use Relevant Words option in Analytic Index creation to skew towards key terms/subject at issue
A whistle blower indicated that some employees may be selling proprietary information to a competitor
Other approaches:
- Most Inclusive Emails to be reviewed
- ECA Filters paired with heatmap to see conversation occurrences
- Concept wheel per custodian or one combined wheel
- Use Relevant Words option in Analytic Index creation to skew towards key terms/subject at issue
- Key word search based upon known key words and criteria
- Batch most inclusive/unique results for review
- Create a concept wheel of the “non-hit” documents to see trends and key terms according to analytics