Tips for Social Media Discovery & Data Preservation Pt.1
Social media has become a engrained way of how people network, communicate, and socialize outside of traditional communication methods such…
Social media has become a engrained way of how people network, communicate, and socialize outside of traditional communication methods such…
For those well-versed in forensic collection and eDiscovery, the thought of a client self-collecting sends up immediate red flags. An…
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…
FRCP Rule 37. Failure to Make Disclosures or Cooperate in Discovery: Sanctions (e) Failure to Preserve Electronically Stored Information. (f)…
TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and…
Rule 26(g) Signing of Discovery Requests, Responses, and Objections is the requirement of engagement in discovery in a defensible and…
From data migrations to emerging technologies, here are some of the best podcasts (in no particular order) to subscribe to…
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…
The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business…
Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically…