Tips for Data Handoffs & Maintaining ESI Protocol
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. In short, data integrity aims to prevent unintentional changes to information. Data integrity is different from data security, the discipline of protecting data from unauthorized parties.
Below are some tips to consider to help ensure a defensible chain of custody and ESI protocol compliant data integrity during the full edrm life-cycle.
Data Integrity Starts at the Source – the user. Manual data entry can result in errors that compromise analytical results meant to guide business decisions. It is crucial that users with system access are properly trained on data entry and upload protocols.
Data Validations Rules & Procedures – Even with a proper training plan in place, there is always room for human-error when a company includes manual data entry in their operations. By using data validation rules, administrators can ensure data integrity by controlling and restricting the values that users can enter into their system. Thus protecting information from accidental alteration, validation rules provide additional security and data quality assurance – a natural requirement for accurate analytics.
Maintain a Clear & Trackable Chain of Custody – When used properly, technology can make it far easier to track documents and information through many hands — but the documentation needs to be careful, conscientious, and complete. Document Data Collection Process to ensure forensic defensibility
TERIS provides unparalleled electronic discovery services that help bridge the gap between traditional methods and new technologies. We provide early, in-depth information about your data so that litigation teams can make informed, timely decisions about their case.
Contact TERIS today.