Posted on: December 18, 2014in Blog
Forensic Investigations and Data Collections Preparation Checklist
Being informed and prepared prior to scheduling a data collection can greatly reduce costs. Providing your collections consultant with the most information possible will ensure an efficient, thorough, and cost-effective collection.
It's critical your IT and legal departments collaborate effectively for a more successful internal investigation process. For best practices and steps that can be taken to improve collaboration between the teams, sign up for the webinar on Feb. 15th!
Here are some things to think about during the planning stages, before you have a consultant come on-site to collect data.
Identify the custodians.
Custodians are the people in the organization that create or access data that is potentially relevant to the matter at hand. Identify and interview them to determine the sources of relevant data.
Determine the general types of data sources in your environment that contain data subject to discovery.
Items to consider include:
- Mobile Devices (tablets and smartphones)
- External Storage Media (CD/DVDs, portable hard drives, thumb drives, etc.)
- Cloud Services (Dropbox, Google Drive, iCloud, etc.)
- Social Media (Facebook, Twitter, Instagram, LinkedIn, etc.)
- Structured Data (SharePoint, CRM, ERP, accounting, DMS, etc.)
- Tape Backup Systems
When the general data sources have been identified, try to collect more specific information:
Desktops and Laptops:
- Make and model (Macs vs PCs)
- Storage capacity (total hard drive size and number of hard drives)
- Is encryption employed? If yes, what type of encryption (Truecrypt, Symantec, McAfee Endpoint, BitLocker)? Is the decryption information (keys, passwords) and contact information for the administrator of the encryption system available?
- Make and model. Apple (iPhone 4S, 5, 5s, 6, etc.), Android (HTC One M8, Samsung Galaxy S5, etc.), Windows (Lumia 1020, Icon etc.), Blackberry.
- Internal storage size, both total and used. For Android, Windows and Blackberry devices is there an SD card? If so, what is the size and current usage?
- Is it password protected in any manner (PIN code, swipe pattern, password, etc.)? If so, please have the ability to supply the password.
- Type of server (file, email, application, database, etc.)
- Operating system running on the server? (Linux, Windows, etc.)
- Is IT support in-house or outsourced?
- If an Exchange Server, do you have the ability to supply access to an administrator account on the server? Alternatively, do you have the ability to supply the username and password for each account?
- If a file server, do you have the ability to supply access to an administrator account with access across the entire network or at least to all locations of relevant data?
- Make, model, and storage size.
- Same issues relating to encryption as for desktops and laptops.
- What social media platform is it? (Facebook, Twitter, Instagram, etc.)
- Is the username and password available? If yes, please provide that information. If no, we may still be able to collect public information, but it will be limited.
- What type of system is it? (SharePoint, CRM, ERP, accounting, DMS, etc.)
- What are the export options from the system?
- Is there a system administrator available on-site or off-site to help?
Take a quick glance through this checklist before scheduling an on-site forensic collection to prevent wasted resources.
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted July 13, 2017
How to Use Office 365 and X1 Discovery to Achieve Your Team's eDiscovery Goals [Webinar]
Posted July 12, 2017
Microsoft Office 365 is Disrupting the eDiscovery Industry in a Major and Permanent Fashion
Posted July 06, 2017
China's Cybersecurity Strategy: 5 Updates You Need to Know
Posted July 05, 2017
3 Workflows to Enhance Your Document Review Process
Posted June 28, 2017
Should you be using TAR? Judge Peck recommends you do
Posted June 21, 2017
Control Litigation Costs by Making the Most of Your Internal Capabilities
Posted June 15, 2017
Shanghai OSAC Quarterly Meeting
Posted June 15, 2017
5 Ways to Reduce eDiscovery Costs Before and During Litigation
Posted June 07, 2017
Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Posted May 31, 2017
How Does the EU-US Privacy Shield Affect Cross-Border Discovery?