eDiscovery Software | eDiscovery Collection Software | Pinpoint Labs

The Pinpoint Blog

Practical perspectives on eDiscovery, legal tech, and smarter data collection.

Mac Target Disk Mode

Booting an Apple Macintosh in target disk mode allows computer forensic examiners to copy relevant files from the internal drive on a Mac computer. Removing hard drives instead from a Mac computer can be time-consuming and damage the system when not performed properly. Therefore, target disk mode allows forensic examiners to access the internal Mac drive as an external hard drive from another Mac or

Read More »

What is deNISTing?

Saving clients money on electronic discovery processing is one of the challenges facing attorneys, service bureaus and their clients. Due to the amount of data collected when imaging custodian hard drives the resulting processing and labor costs can be significant and potentially prohibitive. Reduction of 30%+ Through DeNISTing Many firms have discovered that deNISTing is a relatively easy way to reduce the overall EED processing

Read More »

ESI Self Collection Drives and Kits

Electronically Stored Information (ESI) self-collection drives and kits have become popular in the last few years because they offer an affordable means of collecting electronic data for a legal matter without the need to hire an expensive forensic expert. This article covers what should be included in an ESI collection drive kit as well as some tips to ensure the collections are completed properly. ESI

Read More »

What is a Hash Value?

A hash value results from a calculation (hash algorithm) that can be performed on a string of text, electronic file, or entire hard drive contents. The result is also called a checksum, hash code, or hashes. Hash values are used to identify and filter duplicate files (i.e., emails, attachments, and loose files) from an ESI collection or verify that a forensic image or clone was

Read More »

E-Discovery Collection

E-Discovery Collections also known as Electronic Evidence Discovery (EED) or Electronic Data Discovery (EDD) can include a review of all the data stored on employee desktop or laptop computers, company servers, camera cards, cell phones, smart phones, GPS devices, digital video recorders, digital answering systems, thumb drives, RAID arrays and any other form of electronic media capable of storing data. Types of Electronic Discovery Content

Read More »

How Much is a Petabyte, Exabyte, or Zettabyte?

As our electronically stored information (ESI) data universe continues to grow, we are hearing about increasing storage capacities. The size of a project in terabytes (TB – 1024 Gigabytes) comes up frequently and is often the amount of data that has to be collected, culled or processed on a corporate server. However, now you can purchase a 1TB drive that will fit in a laptop computer.

Read More »

Email Collection

Email Collection refers to the identification and isolation of electronic mail (email) messages that pertain to a specific legal matter in civil litigation cases. What gets collected What is actually being collected during email collections can be one of two things: 1. Files representing the contents of the transmitted email messages themselves (usually in MSG, HTML, EML or RTF format). 2. Container (or store) files

Read More »

What is PST Regeneration?

PST Regeneration is used during electronic discovery processing or even during an ESI collection.  A Personal Folder File (PST) is a container file created by Microsoft Outlook which stores email messages and other data (i.e. contacts, calendar entries, tasks, to do list etc.) How it’s done Regenerating PSTs refers to the identification, isolation and often deduplication of electronic mail (email) messages that pertain to a

Read More »

Get the Latest from Pinpoint

Want to be the first to know when we publish new blog posts, case studies, or announce events? Subscribe to receive occasional updates straight to your inbox—no spam, just insights.

A smarter way to collect mobile data—fast, secure, and remote.

Discover CrossCopy Mobile

CrossCopy Mobile makes mobile data collection easy, fast, and secure—whether your custodians are across the hall or across the country. No apps to install. No tech headaches.