X

esi

OCR Basics – Converting Images to Searchable Text

Optical Character Recognition, commonly known as OCR, is a term you hear frequently in the legal space when it comes…

What to Expect During A Forensic Data Collection

For those who do not work in digital forensics or deal with forensic data collections and investigations on a regular…

Simplifying Review Databases – Repository Hosting In A Secure Environment

TERIS understands the unique demands and processes legal teams require during litigation. As an alternative to in-house systems, TERIS simplifies online document management…

Realizing eDiscovery ROI With the Help of Technology, Workflows, and Project Management

In modern litigation, corporations and law firms need a technological advantage to manage and maneuver through all types of documents, both…

20 Commonly Used eDiscovery Processing Terms Explained

When it comes to data processing and eDiscovery workflows there are various buzzwords and terms that are commonly tossed around…

Cyber Security Tips for Safe Online Shopping This Black Friday & Cyber Monday

With Black Friday and Cyber Monday right around the corner, it’s a fitting time to remember to focus on using safe online browsing habits…

Considerations During the Identification Stage of the EDRM

During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant…

Amazon Echo & Smart Devices: Considerations In Litigation And eDiscovery

In recent years the information requests from Law Enforcement have been rising dramatically, with the majority of these requests either…

Revisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care

Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…

Tips for Social Media Discovery & Data Preservation Pt.2

Social media can house a wealth of evidence, it's no longer just for personal use but has since been wide-spread…