e-Discovery Services

The decisive approach.

E-Discovery is used in companies to identify, prepare and provide data (usually e-mails and documents) relevant to a specific subject matter or to transfer it to third parties.

The term originally comes from the Anglo-American jurisdiction and describes the part of a discovery that concerns electronic documents, such as e-records, e-mails or chat protocols. An E-Discovery process is intended to ensure the completeness of the data and at the same time minimize the risk of losing business secrets. The process is usually supported or partially automated by software.

The EDRM (Electronic Discovery Reference Model) community, a group of legal and E-Discovery experts founded in 2005, has summarized the key processes of the E-Discovery process in the EDRM model. The resulting concept was graphically represented as an EDRM diagram and has become an industry standard.

The EDRM diagram is composed of several blocks that can be performed individually or together. The individual modules do not have to be processed in a fixed order, rather it may be necessary to repeat individual modules once a better understanding of the data has been gained or a changed situation has occurred.

RETHINKLEGAL GMBH • FRANKFURT AM MAIN

We have briefly summarized here what happens in the individual processing steps where we can support you:

Identification

Identification

Identification of sources of potentially relevant information.

Conservation

Conservation

Protection of data from accidental or intentional alteration.

Collection

Collection

Court-proof collection of the identified data and their metadata.

Processing

Processing

The data is imported into review platforms and made accessible.

Review

Review

Reviewing and classifying documents with regard to factual information - relevance.

Analysis

Analysis

Evaluation of electronically stored information for content and context.

Production

Production

Provision of the relevant documents for further processing or transfer.

Cooperations

Through our partnerships, we can offer you the right e-discovery tool for your project at good conditions. Our certified employees set up the project and support you during the project implementation.

E-Discovery Lifecycle

Your data is managed by our experts throughout the entire E-Discovery lifecycle.

Employees

Our colleagues have legal, technical and economic backgrounds. They implement legal projects with experience, IT competence and enjoy challenges.

Infrastructur

For the security of your data we have the necessary technical infrastructure.

Network of experts

If required, we have access to a network of specialized law firms and IT service providers.

Results

We deliver the required results quickly, reliably, legally compliant and confidential.

Anna-Katharina Horn

Head of Legal Services & E-Discovery, Lawyer

Identification

In this phase, potentially relevant documents as well as custodians and time periods are identified. A custodian is the owner or creator of the relevant data. For example, email inboxes of employees are regularly collected in the course of Internal Investigations.

 

Conservation

The data identified as potentially relevant may not be changed, so a legal hold goes out to the relevant custodians. Legal Hold is the legal retention requirement and can be supported by an automated technical process. The collection of the data begins in the next step.

Collection

Some companies have established technical processes to collect data efficiently and in accordance with regulations. Many companies hire external IT forensics or service providers to help collect the desired and required data.

Processing

In addition to deduplication and formatting into readable formats, OCR is applied to all documents so that the texts are recognized, readable and searchable.

Review

The review is carried out in several steps. After pre-sorting by keywords, time periods, file formats and custodians, the documents are sifted and checked for relevance in the first-level review. In the second level review, the documents that were classified as potentially relevant in the first review phase are then checked for their actual relevance. The amount of data is thereby continuously reduced.

 

Analysis

In addition to the knowledge gained from the content of the documents, the information from the metadata is also linked. This analysis can produce new data sources, custodians and time periods - the process then starts all over again.

Production

During production, the relevant data is provided for further processing or transfer. The documents can be transferred as Native File, PDF and also as TIFF. This is usually done in so-called load files. The recipient can then import the data into a review software. Important: Any redaction made to comply with data protection cannot be reversed after production - not even in another document review platform.