Privacy Example 2

Example #2

Working with legacy highly personal documents (under 50,000) containing individual names of persons involved in private felonious activity, a law firm’s objective was to identify and catalog individuals who may have been involved in multiple incidents. For the past three years, the team has worked to establish a cross-reference key list that could be used as a master list that could be prioritized for further investigative review.