Defensible ESI Data Integrity Starts at the Source 

Data integrity is the maintenance and assurance of the accuracy and consistency of data over its entire life cycle. Data integrity is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. In short, data integrity aims to prevent unintentional changes to information. It is commonly associated with data security, which is the discipline of protecting data from unauthorized parties. 

Below are some tips to consider to support a defensible Chain of Custody and that ESI collected is compliant with an ESI Protocol and other best practices during the full life cycle of the data. 

Data Integrity Starts at the Source – the user. Manual data entry can result in errors that compromise analytical results meant to guide business decisions. It is crucial that users with system access are properly trained on data entry and upload protocols. 

Data Validations Rules & Procedures – Even with a proper training plan in place, there is always room for human error when a company includes manual data entry in their operations. By using data validation rules, administrators can ensure data integrity by controlling and restricting the values that users can enter into their system. Thus, protecting information from accidental alteration, validation rules provide additional security and data quality assurance – a natural requirement for accurate analytics. 

Maintain a Clear & Trackable Chain of Custody – When used properly, technology can make it far easier to track documents and information through many hands — but the documentation needs to be careful, conscientious, and complete. Document Data Collection Process to ensure forensic defensibility 

TERIS provides E-Discovery, Digital Forensic, and Document Review services that help bridge the gap between traditional methods and new technologies. We provide early, in-depth information about your data so that litigation teams can make informed, timely decisions about their case.  

Reach out today to see how our team of industry experts can help create a strategic and defensible data strategy for your case.