We use a variety of analytical tools & methodsto strip out irrelevant information & organize ESI for easier review & analysis
Every step of the e-discovery process is important, but the e-discovery processing stage is among the most critical. This step focuses on paring down the amount of ESI collected & rendering it more accessible & easily digestible.
eDiscovery Processing Services
Improperly completing the eDiscovery processing stage can have severe consequences. For this reason, it is imperative that this process be left in the hands of professional and certified e-discovery consultants.
We use a variety of analytical tools and methods to strip out irrelevant information and organize ESI for easier review and analysis.
- Metadata Extractioning
- Keyword Analysis
- OCR Processing (Optical Character Recognition
- Data Culling
- Data Deduplication
- Irrelevant/Unresponsive file elimination
Our experts can assist you with any and all parts of the nine-stage EDRM process
Processing ESI reduces the amount of data for review, paring it down to the essential data relevant to the situation at hand
Improperly completing the e-discovery processing stage can have severe consequences. As a result of improper processing, there may be too much data to sift through, greatly increasing the time and expense required for the e-discovery process. Even worse, improperly-performed e-discovery processing can potentially lead to information that should have been reviewed being missed altogether, which can radically alter the outcome of the legal proceedings.
The National Institute of Standards and Technology (NIST) keeps records for every operating system outlining which files on a data storage device (such as your computer’s internal hard drive) belong to the operating system (as opposed to user-created files). These system files are usually completely irrelevant to an entity’s e-discovery needs and can be harmlessly stripped out, reducing clutter and confusion. DeNISTing is the process of using NIST’s own standards to identify these files and remove them from the ESI identified and collected during earlier stages in the e-discovery process.
In many cases, a source of ESI can contain duplicate files, database entries, or any other type of data which exists in multiple locations in a given source of ESI. Cutting out duplicate data from the review set can considerably reduce the amount of data to sift through and analyze, contributing to a more efficient e-discovery procedure.
Some files found while collecting data from a source of ESI are bound to be irrelevant to the scope of the investigation. Unnecessary files can be stripped from the review set based on a mutable set of criteria depending on the nature of the investigation and the questions that need to be answered over the course of the investigation. An e-discovery investigation may be concerned with only the data from a specific date range, for example, so any data falling outside of that range can be discarded. An e-discovery investigation may be concerned with files of a specific type, size, or file location as well.