SERVICES

K2 provides an extensive suite of services to law firms, corporations and government entities across the full spectrum of the eDiscovery life cycle for litigation, audits and investigations.

Scroll down to read more about K2's offerings or select an EDRM phase to jump to a section

 

Information Governance with K2 Preparedness

With the exponential growth in the volume of electronic documents that companies create and store, the discussion around information governance has risen. Businesses are spending millions of dollars in unnecessary storage and management costs, while also exposing themselves to security, privacy, compliance and legal risks. K2 consultants work closely with companies and individuals to thoroughly examine current systems and advise on best practices for defensible reorganization.

ARCHIVING

PROTOCOLS

In recent years, more companies are upgrading from physical tape warehouses to online storage systems. This allows for consistent archiving protocols, more accessible archives and a searchable system for both discovery and audit. 

RETENTION
MANAGEMENT

A retention policy dictates how long information is retained for and what to do with that information when the time expires. Generally, information should be removed at the earliest allowable point. K2 is able to help facilitate new retention policies.

RECORDS MANAGEMENT

Unmanaged information makes it more difficult to conduct early case assessment and to develop optimum case strategies. K2 experts assist companies with the classification of information for quick retrieval and to develop successful case strategies.

DEFENSIBLE DISPOSAL

Defensible disposal ensures that irrelevant or duplicate information is kept to a minimum. It helps companies to curb storage growth and costs and ensures that potential regulatory requests can be met. K2 can advise on best practices for defensible disposal.

SOCIAL MEDIA

INFORMATION

As communication methods in business evolve beyond phone calls and emails, understanding social media channels is increasingly important. K2 is able to collect and process information from platforms such as Facebook and Twitter and also from instant messaging programs.

 

Identification of People, Systems and Data

Identifying all sources of potentially relevant information can be a daunting task. These sources may include people, groups, IT systems, org charts and paper files. Documenting the locations of potentially discoverable data is necessary to issue an effective legal hold.

K2's team of electronic discovery consultants specialize in developing custom workflows to facilitate the identification and documentation of potential data stores. Our experts have experience from law firms, in-house corporate counsels and Fortune 500 companies.

 

Preservation Against Alteration or Destruction

"Once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction

policy and put in place a 'litigation hold' to ensure the preservation of relevant documents."

       -Judge Shira Scheindlin, Zubulake v. UBS Warburg          

K2 can assist your team with the creation of an ESI retention policy, crafting a legal hold policy, interviewing custodians, mapping, identifying and indexing source data (live and archived) to securely and defensibly preserve potentially responsive ESI. Ensuring proper steps are taken during the preservation phase of a project will help to prevent sanctions down the road.

 

Digital Forensic Collections and Analysis

Dependent upon the specific case requirements, K2 can forensically collect, analyze and report on electronically-stored evidence. K2 has the ability to gather ESI from a number of sources - both live and archived - such as networks, servers, personal computers, backup tapes, removable digital devices, mobile phones, hosted data repositories, email and cloud-based email and social networking sites.

Forensic Collections

K2's digital forensic experts are equipped with the tools and experience to ensure a pristine and forensically-sound deliverable with comprehensive chain of custody documentation. Our on-staff Cellebrite certified experts provide access into cellular devices. K2's digital forensic consultants serve as guides to navigate you through a defensible ESI collection strategy. 

Forensic Analysis

K2's EnCE®-certified technicians are available to perform forensic analysis, such as retrieving and restoring deleted files, identifying hidden data, validating document dates and cracking passwords. By utilizing state-of-the art forensic tools and industry-best practices, our team is able to analyze and report on evidence defensibly.

Data Processing and Early Case Assessment

 

Data processing and early case assessment are two of the most important components of the eDiscovery lifecycle. The validity of a document production is often entirely dependent upon the reliability of the text and metadata extraction in data processing. Taking time for an early case assessment before fully processing electronic documents can save greatly on processing and review costs down the road.

EARLY CASE ASSESSMENT (ECA)

Utilizing state-of-the art technologies and industry best practices for data reduction and risk assessment, K2's ECA methodology streamlines analysis and review in the eDiscovery process.

Various filtering techniques may be applied to efficiently cull down large volumes of ESI, such as deduplication, search term reduction, date range narrowing and file type filtering.

 

Careful analysis during ECA allows users to gain a window into case themes, key time frames and critical communication patterns before incurring processing and review costs.

ELECTRONIC DATA PROCESSING

The ability to quickly process massive amounts of electronic data is an advantage that sets K2 apart from other consultant groups.

Utilizing secure in-house servers, our dedicated processing team is able to render a wide array of document types for review and production.

Electronic documents processed in K2's end-to-end environment also benefit by minimizing the need for migrations between systems. Production documents stored in the same system where they were processed allow for quick research of vital source details.

 

Document Review and Hosted Services 

For many cases, the review phase dominates the hours logged by lawyers and support staff. K2 project managers have a wealth of experience with document review and can advise on best practices for expediting the process. Our hosted and partnered software platforms are objectively the best in the industry.

Bicoastal-Legal-Website-1-Homepage_03.pn

The Bicoastal Cloud Review Center™ uses patented technology to gain a 360 degree view of remote document review teams, ensuring confidentiality, consistency, productivity and 24/7 geographic flexibility to quickly fill your most demanding and time-sensitive projects. https://bicoastallegal.com/

conduent-registermark-horizontal-black-0

Viewpoint

Viewpoint's all-in-one eDiscovery software offers completely integrated functionality in a single product: collection, processing, ECA, review, analysis, production and case management. Viewpoint gives you the flexibility, scalability and automation to manage eDiscovery processes the way you need them to work for your unique requirements and caseload.

logo.gif

Relativity provides everything you need to tackle your document review and production challenges, from the smallest to the most complex projects. Get the control and flexibility you need to design workflows and solutions that amplify your team’s efforts and bring people to the center of your matter.

Untitled.png

Reveal Data’s powerful eDiscovery software and investigations technology creates productivity with advanced features like artificial intelligence, a familiar interface and intuitive design, allowing legal professionals to focus on faster document review. It supports more than 900 file types and can detect more than 160 languages automatically.

 

Analysis and Advanced Analytics by K2

The analysis phase has evolved from what was once regarded as an optional stage for large cases, into an umbrella of information that influences every decision across the eDiscovery process. Electronically-stored information (ESI) is used in various ways in order to analyze potentially relevant documents and systems.

 

Advanced analysis technology helps attorneys to make sense of the massive amounts of data in litigation, re-use work product, find the needle in the haystack and make faster actionable business decisions. K2's team of data scientists specialize in developing custom-coded analytical plans on a case-by-case basis.

Examples of data analytics used throughout the lifecycle of a project:

NEAR-DEDUPLICATION

Near-duplicate identification technology identifies and organizes documents, including attachments, emails and other file types, into groups, increasing both reviewer productivity and consistency. Review side-by-side with intuitive red lines and code large groups of documents individually or across groups.

RELATIONSHIP ANALYSIS

With relationship analysis, users can quickly identify the who, what and when of complex email communications between custodians using simple graphic visuals and maps. Identify communications between known custodians and unknown parties to help you comply with discovery requirements

SEARCH TERM ANALYSIS

Visual index functionality gives users an in-depth
look at their search term results – without needing to run any searches. Users can test term lists and easily identify and exclude false positives in a data set prior to saving searches. Further refine searches with potentially useful terms pulled from the index.

EMAIL THREADING

Email thread analysis functionally groups emails
together from the same conversation and identifies all emails with unique text within a thread. Easily detect subject line changes, new or removed correspondents and missing emails. Tag entire chains at once, preventing inconsistencies.

CONCEPT ANALYSIS

Concept analysis allows users to search and visually cluster documents by concepts (words or phrases) for one or more sources based on multiple criteria. Clustered concepts can be reviewed immediately, saved as searches, or made available to a team of reviewers as batches.

PREDICTIVE CODING / TAR

Predictive coding, or technology assisted review, leverages other analytical results to generate a highly efficient “seed” set. It’s a completely transparent process, providing a robust audit trail and reporting that shows all decisions made throughout the process.

pred.png
 

Productions in Limitless Formats

Untitled.png

Once a production set is identified, documents can be produced in various formats depending on the source file types and the requirements of the document production. Because document review sets may have a variety of file types, it's not unusual for a production to have more than one production format.

 

With the increasingly complex parameters around document productions, the early involvement of technical experts is critical. K2 consultants advise on best practices throughout the course of a case to make sure productions are delivered on time and to the ESI order specifications.

 

Presenting Evidence with Confidence

Technology has played a huge role in transforming the way evidence is presented in trial. Many judges now require legal teams to present exhibits in native format to accurately reflect the source digital content. K2's

Court

automated litigation support systems allow the legal team to quickly and efficiently tag documents identified

as exhibits.

 

Retrieval of exhibits and access to document-level case notes within the database is made easy with K2's online review platforms. Depositions can also be organized within the online database using folders for easy referral during trial.

 

From the first filings through the resolution of a matter, K2 Discovery is your greatest resource.