Tagged with: Forensics & Collections
Corporate Internal Investigations Best Practices
Corporate Internal Investigations Best Practices from D4 An estimated 93% of all data created by corporations is in the electronic format. Subsequently, the number of sanctions levied against parties who improperly handle electronic evidence continues to increase. Here are 11 best practices that should be followed when planning and conducting...
4 Key Internal Roles Involved with Conducting Corporate Investigations
As forensic examiners, one of the most common types of cases we help our clients with is internal investigations. This can mean different things to different organizations, but the purpose of this discussion focuses on employee malfeasance. When faced with an internal investigation, companies, government entities, educational institutions and other...
Corporate Internal Investigations: A Legal & IT Love Story [Webinar]
When a key sales rep leaves the company and goes to work for a large competitor, what do you do with their laptop and mobile device? Does IT have the bandwidth and expertise to defensibly preserve all necessary data? Internal investigations have been known to cause rough patches between the...
Intellectual Property Theft: How to Ensure a Defensible Investigation
Digital forensic investigations involving corporate and private entities come in a wide variety, such as: copyright infringement, theft of personally identifiable information, violation of workplace policies, wrongful termination of employment, network intrusion, wrongful death, divorce and more. Yet, the most prevalent type of investigation the Forensics Services Group handles...
Cloud ESI in eDiscovery: Best Practices for Corporate Counsel
This post was co-authored by Tom Groom and Peter Coons. Cloud computing continues to expand at a rapid pace; businesses use the ubiquitous “cloud” for everything from communication to collaboration, accounting and document storage. Regardless of the size of the organization, cloud computing provides its users significant cost savings and impr...
Text Messages in eDiscovery: Recovery, Retention, and Preservation
Once an organization maps an inventory of its own unique portfolio of cell phones and tablets, a consistent and repeatable process should be instituted in order to ensure data is properly identified, preserved, and considered for use in internal investigations, regulatory and law enforcement scenarios, and eDiscovery proceedings. This...
3 Methods of Mobile Device Extractions and the Data Each Contains
This post defines logical, filesystem, and physical mobile device extractions, and explains the type of ESI each one retrieves; i.e. deleted vs active data. There are three types of extractions that may be performed on a mobile device: logical, filesystem, and physical. The feasibility of these three types of...
OST vs. MSG vs. PST files in Outlook: What’s the Difference?
This post explains the differences between OST, MSG, and PST email file types, how they relate to one another, and how to properly handle each one during discovery. What do all these acronyms mean? If you are a litigation support professional or an attorney dealing with eDiscovery, you have likely...
5 eDiscovery Challenges Unique to Cloud-based Email Solutions
This post explains five eDiscovery challenges that are specific to cloud-based email applications and discusses best practices for handling that data. Cloud-based email was introduced to the market as an email solution for personal use. Internet search giants like Google, Microsoft and Yahoo, as well as, cable and broadband internet...
Cloud Discovery: How Counsel Can Avoid Getting Caught in the Storm [Webinar]
The Cloud has been hovering over the legal industry for years, increasing in menace with every spoliation sanction imposed by the Court. The surge of cloud-based ESI has obsolesced many traditional information technology platforms as well as conventional workflows employed to identify, preserve and collect ESI, and in its wake...
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law
Posted April 26, 2017
How to Use Office 365 Advanced eDiscovery to Prioritize Your Review
Posted April 21, 2017
American Bar Association Section of International Law | 2017 Spring Meeting in Washington DC
Posted April 19, 2017
Office 365 Enterprise E5: 6 Features That Could Benefit Your Business
Posted April 12, 2017
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
Posted April 05, 2017
ESI Data Mapping Basics for eDiscovery
Posted March 30, 2017
China’s Cybersecurity Law: Objectives, Compliance and Business Recommendations