Posts Tagged ‘esi’
OCR Basics – Converting Images to Searchable Text
Optical Character Recognition, commonly known as OCR, is a term you hear frequently in the legal space when it comes to processing, reviewing, and producing documents. As with any tool, OCR should be used strategically and not blindly applied to entire data populations.
Read MoreWhat to Expect During A Forensic Data Collection
For those who do not work in digital forensics or deal with forensic data collections and investigations on a regular basis, the thought of going through a collection can be daunting. In this post, we will cover what to commonly expect when going through a forensic collection, both from the point of view of the vendor as well as the client and custodian.
Read MoreSimplifying Review Databases – Repository Hosting In A Secure Environment
TERIS understands the unique demands and processes legal teams require during litigation. As an alternative to in-house systems, TERIS simplifies online document management with complete hosting and repository solutions. Our systems allow us to quickly setup your database and deploy your case for review within hours instead of weeks.
Read MoreRealizing eDiscovery ROI With the Help of Technology, Workflows, and Project Management
In modern litigation, corporations and law firms need a technological advantage to manage and maneuver through all types of documents, both electronically stored information (ESI) and paper-based materials. Even with state-of-the art technology, workflow, project management, documentation, and information management procedures, the success of a project is dependent on a myriad of factors.
Read More20 Commonly Used eDiscovery Processing Terms Explained
When it comes to data processing and eDiscovery workflows there are various buzzwords and terms that are commonly tossed around in normal conversion. For those unfamiliar with the data handling and processing workflows, these can often be confusing. To aid in that, here are 20 common terms that are used by eDiscovery professionals that relate to the processing stage of the EDRM and overall electronic discovery process.
Read MoreCyber Security Tips for Safe Online Shopping This Black Friday & Cyber Monday
With Black Friday and Cyber Monday right around the corner, it’s a fitting time to remember to focus on using safe online browsing habits and protecting our information when shopping online. According to Adobe, in 2020 Black Friday online shopping surged 22% to a record $9 billion, and it’s only fair to assume we are going to see another big surge this year.
Read MoreConsiderations During the Identification Stage of the EDRM
During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant ESI. Through identifying and defining preferred data sources that potentially hold relevant information, outlining defensible protocols to preserve and collect both structured and unstructured data, and establishing the context that this information is being used, legal teams can create a data map to aid in defining the scope of the case.
Read MoreAmazon Echo & Smart Devices: Considerations In Litigation And eDiscovery
In recent years the information requests from Law Enforcement have been rising dramatically, with the majority of these requests either being subpoenas, search warrants, and court orders. There has been a colossal increase of over 500% from 2019 to 2020, and then in just the first 6 months of 2021 there has been nearly as many information requests as there was in total in 2020.
Read MoreRevisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care
Published nearly a year ago, the American Bar Association’s “Law Firm Guide to Cybersecurity” is more relevant than ever. Cybersecurity and Information Governance are major pillars in the legal sector. Law firms, litigation support providers, and corporate legal departments handle extremely sensitive information making it both crucial that these organizations implement cybersecurity best practices and also stay informed in the current techniques hackers are deploying to get access to this information.
Read MoreTips for Social Media Discovery & Data Preservation Pt.2
Social media can house a wealth of evidence, it’s no longer just for personal use but has since been wide-spread adopted for institutional use. Corporations and small businesses alike have taken to social media to reach a new level of connection with their networks regardless of the industry.
Read More