SlideShare a Scribd company logo
eDiscoveryVisual Identification …  NO SURPRISES
How We Do ItThe Identification GapBig Hole?“Identifying the relevant custodians upfront has far-reaching effects on a legal case. I am frankly surprised no-one has built technology to aid this critical process.”  Ken Leissler, Protiviti
Identification – the problemHow We Do ItOrg Charts and Interviews currently determine people close to the   matter in questionDid we get the right people?
Did we miss anyone?     … from within the group?     … from another department or group?     … contractors (not on org chart)?     … from outside the company?So how do you defensibly get identification right without over-collecting?
Introducing…Visual Identification …  NO SURPRISESVisual Early Case IntelligenceThe only defensible way to get identification right
Visual IdentificationHow We Do ItWe answer 2 primary identification questions:Who are the key custodians involved?
Did you miss anyone?Identify ALL the custodians, first timeEstablish who is key (prioritization)Uncover unexpected custodiansVisualize how people are connected
The ProblemUse Case26f conference preparation –   product liabilityOur client is a Fortune 500 company and were preparing their defense for an alleged product liability case. The collection initially centered on a specific group responsible for the product in question. The plaintiff requested the collection of 100 custodians. Catelas was able to quickly  demonstrate that only 15 custodians were relevant to this case. More importantly, Catelas identified 5 new custodians (not previously considered), who were central to the case. One was a contractor (not on org chart). In fact, the Catelas analysis not only helped reduce and refine the scope of discovery, but provided leading intelligence from the contractor’s emails that greatly impacted thecourse of actiontaken by our client.

More Related Content

PDF
StrategicFit Unconventional Resources Brochure
PPTX
Captura de imagens atividade dia 22 09 2011 (1)
PDF
Payment 2010 - Announcement
PPT
4. symbolic logic
PPTX
M. Kralovic, S. Thompson: How to Develop Global Partnerships and Exchange Pro...
PPT
Making the Most of Teacher Training Programs
PDF
Wiraswasta
PPT
Making Classroom Connections Worldwide
StrategicFit Unconventional Resources Brochure
Captura de imagens atividade dia 22 09 2011 (1)
Payment 2010 - Announcement
4. symbolic logic
M. Kralovic, S. Thompson: How to Develop Global Partnerships and Exchange Pro...
Making the Most of Teacher Training Programs
Wiraswasta
Making Classroom Connections Worldwide

Viewers also liked (15)

PPTX
G. Yuen: We Need Chinese Teachers! (T4)
PDF
Short case...Neuro-Behcet
PDF
Wollen Sie das VORSCHAUEN? YP-S3 #.1
DOCX
Cadenas tróficas y ciclos biogeoquímicos
PPTX
CRM Tools Suck
PDF
Remix 4 p ke 4a
DOC
PDF
Publishers forum2010deutsch
PPT
Soc345 lect7 religion
PPTX
загадочный титан
PPTX
Comparative Methods In Social Sciences
PPTX
It's All About Community
PPT
Educació Salut Tutoria
DOCX
DSA_Canopy_Report
G. Yuen: We Need Chinese Teachers! (T4)
Short case...Neuro-Behcet
Wollen Sie das VORSCHAUEN? YP-S3 #.1
Cadenas tróficas y ciclos biogeoquímicos
CRM Tools Suck
Remix 4 p ke 4a
Publishers forum2010deutsch
Soc345 lect7 religion
загадочный титан
Comparative Methods In Social Sciences
It's All About Community
Educació Salut Tutoria
DSA_Canopy_Report
Ad

More from Rob Levey (20)

PPTX
How secure is your data?
PPTX
Does your Data have Super-Powers?
PPTX
Rune - Empowering User-based Security
PPTX
Unleash the power of your people mar2012
PPTX
How to say NO to outrageous Preservation Requests
PPTX
Annual Performance Reviews
PPTX
Using Power Maps for Sales Success
PPTX
Catelas 360 degree Partner Assessments
PPTX
Are you spending too much on Legal settlement costs?
PPTX
Catelas Investigations & Litigation
PPTX
Catelas - Conducting cost effective Internal Investigations
PPTX
Catelas Early Case Assessment Trap
PPTX
Collaborative Selling
PPTX
Early Case Analytics
PPTX
Collaboration webinar
PPTX
How corrupt is your International Business?
PPTX
Unleash the power of your people
PPTX
Catelas Security & Investigations
PPTX
Catelas Deloitte FCPA webinar
PPTX
Catelas Security Webinar 12 14 10
How secure is your data?
Does your Data have Super-Powers?
Rune - Empowering User-based Security
Unleash the power of your people mar2012
How to say NO to outrageous Preservation Requests
Annual Performance Reviews
Using Power Maps for Sales Success
Catelas 360 degree Partner Assessments
Are you spending too much on Legal settlement costs?
Catelas Investigations & Litigation
Catelas - Conducting cost effective Internal Investigations
Catelas Early Case Assessment Trap
Collaborative Selling
Early Case Analytics
Collaboration webinar
How corrupt is your International Business?
Unleash the power of your people
Catelas Security & Investigations
Catelas Deloitte FCPA webinar
Catelas Security Webinar 12 14 10
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Touch Screen Technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Getting Started with Data Integration: FME Form 101
Assigned Numbers - 2025 - Bluetooth® Document
Unlocking AI with Model Context Protocol (MCP)
DP Operators-handbook-extract for the Mautical Institute
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
A Presentation on Artificial Intelligence
Digital-Transformation-Roadmap-for-Companies.pptx
TLE Review Electricity (Electricity).pptx
Enhancing emotion recognition model for a student engagement use case through...
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Touch Screen Technology
Programs and apps: productivity, graphics, security and other tools
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
WOOl fibre morphology and structure.pdf for textiles
Getting Started with Data Integration: FME Form 101

Catelas Visual Identification for eDiscovery

  • 2. How We Do ItThe Identification GapBig Hole?“Identifying the relevant custodians upfront has far-reaching effects on a legal case. I am frankly surprised no-one has built technology to aid this critical process.” Ken Leissler, Protiviti
  • 3. Identification – the problemHow We Do ItOrg Charts and Interviews currently determine people close to the matter in questionDid we get the right people?
  • 4. Did we miss anyone? … from within the group? … from another department or group? … contractors (not on org chart)? … from outside the company?So how do you defensibly get identification right without over-collecting?
  • 5. Introducing…Visual Identification … NO SURPRISESVisual Early Case IntelligenceThe only defensible way to get identification right
  • 6. Visual IdentificationHow We Do ItWe answer 2 primary identification questions:Who are the key custodians involved?
  • 7. Did you miss anyone?Identify ALL the custodians, first timeEstablish who is key (prioritization)Uncover unexpected custodiansVisualize how people are connected
  • 8. The ProblemUse Case26f conference preparation – product liabilityOur client is a Fortune 500 company and were preparing their defense for an alleged product liability case. The collection initially centered on a specific group responsible for the product in question. The plaintiff requested the collection of 100 custodians. Catelas was able to quickly demonstrate that only 15 custodians were relevant to this case. More importantly, Catelas identified 5 new custodians (not previously considered), who were central to the case. One was a contractor (not on org chart). In fact, the Catelas analysis not only helped reduce and refine the scope of discovery, but provided leading intelligence from the contractor’s emails that greatly impacted thecourse of actiontaken by our client.
  • 10. Thank YouRobert Levey978 996 2758robert.levey@catelas.comwww.catelas.com

Editor's Notes

  • #3: Catelas is focusing on the far left hand side of the EDRM – Identification. We believe if you get identification right, first time, this has major implications for eDiscovery throughout the rest of the EDRM. Not least on Preservation and Collection.So what are the consequences of NOT getting it right?Legal Hold: clearly if you do not preserve all of the relevant custodians you run the risk of spoliation.26f: but equally, if you over-collect, not only does this drive up the scope and cost of litigation (throughout the EDRM), but strategically you are giving opposing counsel a wider net from which to search for evidence. Now obviously, no-one is deliberately trying to hide data from opposing counsel, but you are trying to limit the scope in line with proportionality. Having a defensible case for who and what should or should not be included, is key.Closer:One of our client’s, Ken Leissler, put it very eloquently – getting identification right has FAR REACHING effects on the entire legal process. While technology is being used to aid eDiscovery in virtually every other part of the EDRM, not so much for identification…. this area is more about “feel and touch”
  • #4: Current process:When we have asked our clients how do they identify custodians – for Preservation or further into Litigation – we always get the same answer - Org charts and Interviews. The identification typically starts with ‘who’ was close to the matter in question, which triggers a series of interviews to find out more.The Problem:This process is far from complete and exhaustive. In fact it is subject to significant gaps - how current is the org chart, is everyone on the org chart, do the people being interviewed remember all the players (if the matter goes back a few years). It is very easy to miss key people. Furthermore, this process does not reflect the way business is done in reality – the modern enterprise encourages cross-functional collaboration and social networking tools (twitter, facebook, etc) encourages {sometimes} social interaction at work. So business really does not happen in silo’s anymore.Closer:So is there a way to defensibly get identification right? To demonstrate a methodical process for identifying who to preserve or to reason for a narrower scope of collection?
  • #5: We believe there is…Catelas has introduced the Dynamic Business Org Chart (we do not call it a Social Org Chart) since people then think we are analyzing public social networks (like Facebook and LinkedIn). We are not – we mostly map email communications inside and outside of a company.This provides an up-to-date view of everyone in a company (including partners, customers and friends) and how they interact – ‘who knows who’, ‘how well’ and ‘what are they talking about’Why is this important – well we provide VISUAL EARLY CASE INTELLIGENCE based on a thorough understanding of who has relationships with Key Custodians, instantly alerting you to the non-obvious. For example, a key custodian may be the VP R&D. Our maps visualize all the relationships he shares inside and outside the company, including the fact that he has a very strong relationship with a Technical Contractor (who was not on the org chart) or a Marketing Intern (which seems odd) or with key people at the company suing our company for a Patent Infringement. We are taking a snapshot of the entire organization, not just a sample of the Key Custodian and the people immediately around him or her. And its based on real communications – literally every email communication, inside and outside the company. Comprehensive and defensible.In fact we believe it is THE ONLY defensible way to get identification right. We ELIMINATE SURPRISES.
  • #6: Let’s take you through how the process works in practise:Client engages with us either at Legal Hold or 26f stageClient provides us with their email Log Files (last 30 days) and/or 2-5 Key Custodian pst’s (or nsf’s)We answer 2 primary questions – who is involved AND did you miss anyone.We do this through a rigid methodology which we have actually borrowed from Law Enforcement and the way investigations are conducted in real life crime scenes.Identify ALL custodians – from 100% of the organization, not an assumed sample (eg one department)Prioritized list - who is most important versus least or (not) important based on relationshipsUnexpected or missing custodians – these are often referred to as “tangential custodians” and typically serve as an inter-mediary between two key custodians. In other works people in common who link two key custodiansVisualizations – a picture paints a thousand words – maybe more – our secret sauce is our ability to visualize what relationships look like and how people connect with one another. The non-obvious suddenly becomes obvious.
  • #7: I don’t expect you to read these use cases, but I will re-iterate some key points:-Key relationships map was able to prioritize the key custodians (85 custodians were NOT relevant) – saving over-collectionReduced scope and cost of collection/production request.Defensible methodology – documented and comprehensiveIdentified new, relevant custodians, including contractor (not on org chart)Found key case intelligence (from contractor’s emails) that swayed the outcome of the caseTurnaround – less than 48 hours