LO2 operates in three areas: 1) helping legal tech companies create their AI solutions and performing services for them for their clients; 2) performing traditional litigation document reviews and; 3) doing data breach notification document reviews.
I was able to impose on my friend, Canopy’s Founder and CEO, Ralph Nickl, and interview him for this piece.

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL
I had become increasingly aware that most eDiscovery tools were falling short when applied to problems outside of traditional litigation and investigation. In order to solve those traditional problems, eDiscovery software was designed to find documents in order to tell a story relevant to specific issues. At first blush, it made sense to apply the search, analytics, and review capabilities of eDiscovery software to find protected information that has been compromised. But when you consider that the goal of data breach response is to produce a consolidated list of compromised personal identifiable information, beliefs, health, and financial information about individual employees, clients, patients, or other individuals, it’s clear that a purpose-built solution is warranted. When using standard eDiscovery solutions, what do you do with this protected information once it is discovered? How do you compile that information across hundreds of reviewers? And, how do you shift from a paradigm of case specific discovery to universal discovery based on common definitions of PII? When we first looked at the data breach review problem, our idea was just to provide a coding panel that could be integrated side-by-side with any eDiscovery tool. As we examined the entire process of creating the list of affected individuals, we found there were many more opportunities to provide value, because so much time was lost trying to bend the review platform to the work that was being done. That inspired us to remove all the typical eDiscovery relevancy review functionality and replace it with features to detect, extract, resolve, and relate protected-data (personally identifiable information, protected health information, etc.) about affected individuals found in the documents. We established partnerships with data breach response leaders like LO2 so that we could jointly change the paradigm and shape how this sort of work gets done going forward.

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL

HARRY BUCK

RALPH NICKL
I think document review is a convenient term that means a lot of different things. We are not providing a review tool for relevancy. Instead, we are providing a document review tool to extract affected individuals and build their sensitive information profiles. We highlight protected-data, and you can click to add this information to the individual’s profile, eliminating copy and paste or transcription errors. All the while, the system is intelligently looking ahead at the rest of the data for the same patterns and deduplicating profiles entered by hundreds of reviewers. There are literally dozens of additional features that we introduced to solve the Data Breach Discovery problem. As I mentioned previously, a reviewer can import tables of PII into the master list of entities during first pass review. Canopy classifies images containing protected-data such as an image of a driver’s license or passport and presents all of the images in a gallery view to allow a data analyst to quickly determine if they contain PII or not. Canopy provides a detailed entity view that allows quality control user to trace all of the discovered protected- data for an individual back to each source document.

HARRY BUCK

RALPH NICKL
We eliminate the manual impact assessment phase, saving approximately 80 to 160 hours of analysis. We provide a data breach impact assessment report automatically, in hours (the time it takes to process data), instead of a team of people taking a week to ten days.
When compared to a review-all-documents approach, our clients have been able to reduce the review cost up to 90% by reducing the number of documents promoted to review. To do this, a team uses Canopy’s analytics to surgically segregate documents into three groups: those that do not contain protected-data, those that contain protected-data, and those that require more analysis. Of course, culling is limited by the percentage of documents containing protected-data elements. Also, during this phase, there is an ability to automate some of the review by providing known lists of protected-data.
We’ve improved the document review speed by at least 20% for documents without tables/spreadsheets. Taken together, the ability to reduce the volume of data reviewed and increase the efficiency of the review process itself represents the greatest cost savings.
For spreadsheets or documents containing tables, reviewers have been able to map and load tables with ten-thousand rows of protected-data in less than five seconds, as opposed to one hour, as is typical with a traditional review.
We reduce the one to two-week effort to clean up and normalize the list of entities for notification by over 80%. We also provide unique tools to review and quality-control the final list of individuals.
Ultimately, Canopy reduces the amount of time and resources involved in post data breach discovery while increasing the quality of the list of affected individuals. With Canopy, incident response teams can meet regulatory deadlines while reducing their cost.

HARRY BUCK

RALPH NICKL
We will continue to build out Canopy’s data breach discovery software to enable service providers, legal teams, and consultants to conduct thorough post-data breach response analysis and review with unprecedented efficiency.
We are exploring a couple of other proactive protected-data use cases where our partners have expressed that we have the basis for a killer app. We feel that applying Canopy’s technology to protected-data at risk is the next logical step.
Harry, thank you for the opportunity to speak with you about our partnership! it’s been wonderful to support LO2 as you’ve formalized your Data Breach Notification Document Review offering.