Offering full end-to-end eDiscovery services, covering all phases of discovery:
Processing, ECA, Culling, Document Review and Production
Using our services, clients could save up to 60% compared to competitors. In one instance, we have saved a client over $1 million dollars in consulting service fees over a period of 2 and a half years of litigation support and project management.
No blended rates. You pay for the resources that you use at the established rates.
Clients will be invoiced based on the actual hours spent working on a project. A detailed record of resource hours/activities will accompany the invoice submission. Typical activities include consulting, project management, data processing configuration, post processing analysis, ECA reporting, search execution, document review, and data production.
Clients will be invoiced based on the data size that is extracted from any first level compression (WINZIP, 7ZIP or other compression tools) that may be used by clients to help reduce overall data transfer times. This will also address issues that may occur where compression tools are used to break the data into smaller pieces to address any other transfer issues with larger files.
Clients will be invoiced based on the fully expanded and de-duplicated processed data size that would be used for review along with the database size.
*The processing and hosting charges are supported by reports generated directly from the VenioOne platform and are provided as part of the invoice submission.
VenioOne Unified Platform Details
- 500+ file types supported
- Date ranging and other ingestion filtering capabilities
- De-NISTing and system file removal
- De-duplication (Global and by custodian, DynamicDeDupeTM, StaticDeDupeTM)
- Project Dashboard displays a high level project overview for ECA
- Email threading
- Language identification
- Interactive communications network and timeline
- Isolate emails from a communication to view individual documents and metadata
- Predictive coding (Venio Assisted Review)
- Data sampling
- Comprehensive searching methods and capabilities
- Keyword and Boolean searching, as well as fuzzy and proximity searches
- Synonym searching (English)
- Filtering throughout review process
- Customizable layout for each Reviewer
- Detailed management options of Reviewer rights
- Tracking of overall Review progress and statistics per Reviewer
- Redaction support
- 100+ exportable fields
- Customizable settings
- Various export formats: HTML, native, images, full text
- Searchable and non-searchable PDF
- Supports exporting to numerous types of load files
† Venio Touch available to keep stake holders informed of project metrics and status of tasks via their smartphones (Android, iOS).
†† Granular user management to address security or privacy concerns.
Infrastructure and Data Security
Servers are managed and located within one of Cogeco Peer1’s data centres within the Greater Toronto Area. Within this facility, power, cooling and internet connectivity have been configured with redundancies in place.
Video surveillance, 24/7 onsite staff, identity access control, and biometric entry ensure that only those authorized have physical access to the servers.
Cogeco Peer1 has the following certification reports available for the data centre where our equipment is co-located:
- PCI 2.0 – Physical Security Only
- SSAE 16 Type II
It is important to note that these reports are specific to Cogeco Peer1 and do not represent REW Computing Inc.’s processes.
“Cogeco Peer 1 Colocation Solutions provide your business with access to advanced cooling systems, ultra-reliable power infrastructures, robust fire detection and suppression systems, as well as multi-layered security and surveillance systems to keep your technology safe and provide you with the efficiency, reliability and scalability that your applications demand.”
A Cluster of VMWare Hosts, Netapp Disk subsystem, redundant fiber channel switches, and redundant network switches, establish the basis of our infrastructure, providing us with fail over capabilities without an impact to the end users working within our system. We further leverage the Netapp Disk Snapshots and replication to ensure that the data and server configurations are backed up and restorable in the event of a catastrophic event.
Depending on your requirements we have the capability to enable Data Encryption at Rest through the Netapp Disk subsystem, however there are impacts to data transfer/access performance when using the software that we host. We have been testing Data Encryption at Rest to ensure that there are no other technical issues with the software. Once we have completed this testing we will be considering whether to enable it globally or not.
Server Management and Support
Our service providers have industry leading staff with VMWare, Netapp, and Microsoft Certifications, along with many years of hosting experience and managing large enterprise systems. Our contracts are in place to allow us to work with and integrate these members into our support stream as needed with 24/7 access and support.
In closing, we are happy to respond to a security assessment/questionnaire if required while preparing to engage a relevant service offering.