X

esi

Defensible ESI Data Integrity Starts at the Source 

Data integrity is the maintenance and assurance of the accuracy and consistency of data over its entire life cycle. Data integrity…

Popular Social Media & Messaging Apps Ranked by Monthly Annual Users

This post is an overview look at some of the most common social media and messaging apps to help provide…

How to Practice Safe Online Habits and Make Cybersecurity a Priority

All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…

How Data Analytics can Empower Strategic Data Decisions

The sheer volume of data is exploding, so much so that a puny one gigabyte of storage on one lowly…

Litigation Readiness for Risk and Cost Management

Manage cost and risk with consistent results. From SEC/FINRA investigations to complex litigation, don't “go-it alone"... industry experts can assist…

Upcoming eDiscovery Industry Events Summer/Fall 2022

With in-person events returning, there are several upcoming conferences that have been announced that cover topics of eDiscovery, review, and…

How E-Discovery Project Management Improves Efficiency and Processes During Discovery

There's nothing more important than having a strong advocate for your case. E-Discovery Project Managers see to it that your…

E-Discovery Processing Workflows Explained – What is De-NISTing?

De-NISTing is the standard eDiscovery practice of removing system files, and other non-user generated ESI from a dataset during the data processing stage. NIST refers to the acronym of…

Interesting IoT Statistics and How it Applies to E-Discovery

Our daily lives are constantly evolving, and the Internet of Things (IoT) plays a massive role in that. Devices that…

Considerations for Building an Effective ESI Protocol

Having a clear and straightforward ESI protocol in place upfront reduces back and forth time between counsel and overall discovery…