How we do it
We do it with Forensics.
We’ve never encountered a document, file, or drive
that we couldn’t capture and convert!
Cipher can pierce any of the typical barriers to electronic information by:
- Bypassing password protections
- Breaking routine and higher-level encryptions; and/or
- Isolating and eliminating any form of viruses and worms.
We can capture and convert virtually any type of digital file to a single searchable platform or production mode, including email messages, file systems, spreadsheets, word processing files, desktop publishing files, presentation files, graphic, and text files. Data stored on virtually any kind of media, whether it is an encrypted hard drive, Zip drive, or tape drive, can also be captured, converted, and stored.
Our basic forensics services include:
- Collecting and harvesting information
- Code and encryption cracking
- Data searching to secure seemingly elusive data
- Web mining
We “harvest” data by several methods in conjunction with the in-house IT staff and in accordance with standards for satisfying legal chain-of-custody and authentication requirements.
Cipher’s profiling service allows us to quickly tell you the number and types of files and information that you typically want to have before you go to the expense of processing it. We also check every file for viruses and isolate infected files before review. Each file is given a unique digital date/time stamp, facilitating specific identification throughout the processing lifecycle. Profiling provides valuable information about the files themselves, identifying numbers of documents and estimating numbers of pages.
We can profile hundreds of different file formats, as well as identify and crack encrypted and password-protected files.
Once files have been identified via Profiling, several pre-conversion operations allow you to further reduce the total volume of documents that need to be converted for legal professional review.
In many cases we are able to reduce the final document volume by 70 percent or more. This significant culling reduces the size of the resultant database, minimizing conversion costs and inefficient professional review of redundant documents
Cipher’s converting process enhances accuracy: Cipher converts all electronic documents to our proprietary image format which can be converted to single page TIFF, multiple page TIFF, or PDF, and embeds the data formats into each image object. This process allows Cipher to ensure that all metadata (e.g., email headers, author, date, etc.) are connected to the document.
Cipher’s conversion process enables alphanumeric labeling on all or any designated portion of the documents. We can also electronically locate the best place for labeling to avoid obliterating any portion of the document.
For your convenience, Cipher can produce documents to all possible media formats, including to a Web server (secure extranet), CD/DVD, and to any printer.
Cipher can also deliver the converted data (or a subset of the data) in a form that can be used in conjunction with many leading packages, such as Summation, IPRO, and Concordance, among others.
Our solutions manage vast amounts of information, in fact, multi-millions of documents, by targeting relevant information, profiling documents for priority review, detecting duplicate documents, and offering a flexible range of production alternatives.
Cipher uses an advanced ranking system that ensures that those documents most relevant to a user’s query are returned to the top of the list, greatly reducing review time and increasing efficiency.
Cipher offers users the opportunity to “subscribe” to changes in documents, folders, categories, and search results. Subscribers receive notifications via email whenever a change occurs.
Flexible Production Alternatives
Cipher allows your users to make redactions directly on files stored electronically and to block that information from the view of others who get the information electronically.