Schedule your FREE demo today!
Schedule a FREE demonstration or ask any question. We’d be happy to help.
[gravityform id="4" title="false" description="false"]eDiscovery Software | eDiscovery Collection Software | Pinpoint Labs
PST Regeneration is used during electronic discovery processing or even during an ESI collection. A Personal Folder File (PST) is a container file created by Microsoft Outlook which stores email messages and other data (i.e. contacts, calendar entries, tasks, to do list etc.) How it’s done Regenerating PSTs refers to the identification, isolation and often deduplication of electronic mail (email) messages that pertain to a
ESI (Electronically Stored Information) is the general term for all of the data stored on the hard drives, camera cards, cell phones, GPS devices, digital video recorders, digital answering systems, thumb drives, RAID arrays and any other form of electronic media capable of storing data. Types of Electronically Stored Information: Files – Files are by far the most common arrangement for ESI data. Files (also
Active File Collection refers to the collection of files that are active (not deleted) and pertain to a legal matter or legal hold. In most civil litigation cases, extensive forensic investigations that look at deleted files are unnecessary or too expensive. Thus, most ESI collections are active file collections and/or email collections. How active file collections are performed Active files are those that can be
A couple weeks ago, I outlined what computer forensics and electronic discovery have in common and how they differ. I’d like to expand on this topic by identifying some common obstacles encountered when using popular computer forensic software for typical electronic discovery projects. A typical computer forensic case may involve: A small quantity of email and/or attachments Recovered files, internet history, and user activity Registry
Each day, corporate IT managers, computer forensic examiners, and litigation support professionals are tasked with performing ESI collections for relevant files which reside in file shares, on client systems, and other popular data sources. The content may include Microsoft Exchange mailboxes, departmental data, individual custodian files, internet logs, telephone logs, or other critical corporate content. Over 4 years ago, Pinpoint Labs released SafeCopy version 2.0 (SafeCopy 2)
We will be attending LegalTech New York and I wanted to invite you to come by and visit our booth. We will be in booth #429 on the 1st floor of the exhibit hall. There are several updates to our software applications that we will be demonstrating, and if you attend, I would appreciate the opportunity to meet with you. I’ve been participating in LegalTech
‘Imaging a hard drive’ is a phrase that is commonly used for preserving the contents of a custodian hard drive or server. It can also be used to describe when a custodian hard drive is cloned. It is worth taking some time to understand the differences and the advantages and disadvantages of each process. Forensic Imaging A forensic image or evidence file container (such as
It’s important to understand that deleted email is not recovered or indexed using common litigation support or electronic discovery software. These applications only process email that is still visible within the email software. Some email recovery software can also fall short when restoring deleted email records. Why is that? Because they are designed to undelete email records that still have an entry in the mail
Copying corporate data and using it at a competing company (intellectual property/corporate asset theft) is a common and serious concern for companies and their legal counsel. When employees leave companies, there are often questions about the security of the information they previously accessed. Will they use the contacts, forms, or product details as a competitive advantage in their new job? I had previously written about
Schedule a FREE demonstration or ask any question. We’d be happy to help.
[gravityform id="4" title="false" description="false"]CrossCopy Mobile makes mobile data collection easy, fast, and secure—whether your custodians are across the hall or across the country. No apps to install. No tech headaches.