Skip to main content

E-Discovery

Tems Security offers eDiscovery services following the EDRM standard, with CYOD confidentiality levels, and full BYOD integration.

As a leading Austrian company in eDiscovery and computer forensics, Tems Security operates a state-of-the-art computer forensics lab, allowing your data to be remotely analyzed on a “Next Generation” eDiscovery platform.

For years, we have focused on the field of Discovery, dedicated to providing companies of all sizes, industries, and case complexities with the right Discovery solution and a tailored workflow.

Our computer forensics lab and expert team offer numerous advantages:

  • Your data can be comfortably analyzed on a “Next Generation” eDiscovery platform remotely.
  • A Single Sign-On (SSO) solution requires only one username and password for encrypted data access from any device.
  • Our current solution allows you to implement full CYOD (Choose Your Own Device) in two out of three classification levels. In the highest confidentiality level, pre-configured notebooks are at your disposal.
  • We are one of the leading Austrian companies in eDiscovery and computer forensics, capable of configuring an IT security concept tailored to your case through a personal conversation or choosing from our three predefined IT security concepts.
  • As IT security specialists, we can install and operate all solutions promptly either in a law firm or directly at the client’s location, depending on the case.
  • Our eDiscovery solution, approved by the manufacturer, is complemented by two manufacturer-certified administrators and two additional project managers, available competently and, if necessary, outside regular working hours.
  • Your data remains within the protected area at all times, hosted in a secure and redundantly connected data center in Vienna.
  • Your data consistently enjoys confidentiality according to the Austrian Data Protection Act.

Classification
Tems Security’s data center protects your data as confidential, strictly confidential, and highly confidential.

Your data, handed over to us, is exclusively processed in our own data center and made accessible to you through encrypted communication channels. Depending on the security level you choose (confidential, strictly confidential, highly confidential), the following support services from our eDiscovery team are available:

  • Confidential
    Your data can be provided via a secure “SSL-VPN” connection. You are assured of up to 20 simultaneous reviewers and support from Tems Security.
  • Strictly Confidential
    Data center access involves an additional security component. With two-factor authentication, access is additionally protected from third parties. You are assured of up to 30 simultaneous reviewers and support from 13×6.
  • Highly Confidential
    We provide the required number of notebooks for your review. Access to the eDiscovery platform is possible only from these pre-configured notebooks. Premium support is assured 24×7.

Tems Security’s specialists offer a simple, individual solution for this complex challenge arising from the Austrian Data Protection Act.

Raw Data Processing
OCR procedures, deduplication, hash value calculation, metadata preparation, and more are some terms and functions applied by Tems Security’s experts.

Data Processing
To manage large data volumes and quickly identify key topics, an eDiscovery platform processes only unstructured and user-generated data. At Tems Security, all data processing is performed by two employees. In case of doubt, a second forensic program is used—data processed in parallel depending on file format and project scope, followed by a comparison of both products’ results. This entire process is crucial in an eDiscovery project.

Data Cleanup
This step involves filtering material and non-material items and cleaning duplicates for all project data. If new data is added during the project, it undergoes cleanup, and all duplicates are executed. Non-readable PDF documents are made readable using the Optical Character Recognition (OCR) process. Depending on the assignment, attempts can be made to decrypt encrypted documents using various methods. Tems Security conducts this step in compliance with the Austrian Data Protection Act.

Keyword Lists
You provide us with your keywords, which we apply to the cleaned dataset. The results are documented in an Excel sheet and discussed with you. Tems Security can adjust the keywords either “on the fly” or in consultation with you, updating the results. The Tems Security team is available to assist in creating an efficient keyword list, specifying various aspects like metadata or date-related data for each keyword, and applying various keyword combinations individually or with other keywords in the index program. All keywords are marked for you, and this information is also exported, available as additional information in our eDiscovery platform.

Export
The hits from the index program are exported automatically only when you agree with the results from the keyword list. It is essential to discuss and can be project-specifically adjusted. These process steps ensure the completeness of the export and the complete import of data, saving time in the project.

Review Preparation
Tems Security defines and prepares data for review in collaboration with you.

Data Import
After the automatic import of data, the imported data undergoes Quality Consulting (QC). The imported data is re-indexed, allowing you to leverage numerous advantages in our review platform based on permissions.

Workflow Definition
A tailored workflow is defined and implemented collaboratively based on various parameters for the upcoming eDiscovery project. Some parameters influencing the workflow definition are:

  • Predictive Coding support
  • Number of data for the 1st Level Review
  • Chosen classification level
  • Number of reviewers

Authorization
Our review platform offers a granular and functional authorization concept at either group authorization level or user level. We apply the principle of “need to know” for your sensitive data. Tems Security provides a consistent Single Sign-On (SSO). This ensures an individual user is created for each user in the review platform, maintaining a continuous audit trail. Your eDiscovery project manager can independently access all project KPIs on their dashboard in real-time, essential for precise resource planning. Your designated project manager also has an overview in real-time of how many documents are still open for review and how many relevant or irrelevant documents have been identified.

Batching
Documents for the 1st Level Review or 1st Level QC Review can be controlled and provided to your review team according to your preferences. In this process, you have the option to assign this based on topics, employees, time frames, etc., offering you the utmost flexibility. Through an efficient batch process, you can expedite and precisely carry out the review with your review team.

Workflow & Coding
During this phase, we can support you with our “Predictive Coding Solution.”

1st Level Review
As part of the workflow definition, the coding options for the review team are defined. The coding can be adjusted based on the project’s progress. Some fields or functions may not be easily adjusted during the project. Typically, the 1st Level Review team has up to seven options to identify a document in the 1st Level Review. Depending on the document, our review platform can analyze between 500 and 1,200 documents per day per reviewer.

1st Level QC
Depending on the assignment or scope, a quality check, based on a random sample of xx%, can be conducted. Our review platform provides numerous QC options for the 1st Level Review. Based on your workflow, we will implement the best possible process for QC. A specific coding template is also created and provided for the 1st Level QC.

2nd Level Review
All relevant documents from the 1st Level Review are prepared for a 2nd Level Review, with an enhanced coding template. Depending on the project size, redaction of documents can be performed by the 2nd Level Review team itself in our eDiscovery platform.

2nd Level QC
Depending on the assignment or scope, a quality check, based on a random sample of xx%, can be conducted. Our review platform offers various options for QC of the 2nd Level Review. Based on your workflow, we will implement the best possible process for QC. A specific coding template is also created and provided for the 1st Level QC.

Predictive Coding
Our self-developed, transparent, and fully automatic logical assistant can support you in mass data analysis during the 1st Level Review if needed. Sorting through large data volumes in a 1st Level Review can be a significant challenge for the review team. For this specific review step, we have developed an algorithm, based on our years of experience in eDiscovery, that can simplify and almost entirely take over your tasks. This type of automatically learnable support is known as Predictive Coding. Depending on the situation and scope, you might need to analyze only a few hundred documents in a sample review in our web-based eDiscovery Review Platform. Predictive Coding can minimize the review workload if necessary or serve as an additional quality assurance for the 1st Level Review.

Presentation
Edit documents quickly, efficiently, and at any time with the eDiscovery program from Tems Security. After the “Legal Export” of relevant documents, the project is archived and can be reactivated if needed.

  • Redaction
    The term “redaction” refers to a form of editing where multiple text sources are combined and slightly modified—perhaps by partial blackening or highlighting text blocks—to create a single document. Tems Security’s eDiscovery program offers you this capability directly in the web-based program, allowing you to quickly, efficiently, and independently edit documents at any time.
  • Export
    Case-relevant documents can be exported and delivered at any time or collectively after the review in a so-called “legal export.”
  • Project Documentation
    The ongoing notes kept by Tems Security during the project are compiled into project documentation afterward. This documentation provides you with a comprehensive “Chain of Custody” overview, including data collection, data preparation, keyword results, results from the 1st Level Review and 2nd Level Review, as well as the workflow description.
CALL NOW!