eDiscovery Software | eDiscovery Collection Software | Pinpoint Labs

Blog

LegalTech New York 2009

We will be attending LegalTech New York and I wanted to invite you to come by and visit our booth. We will be in booth #429 on the 1st floor of the exhibit hall. There are several updates to our software applications that we will be demonstrating, and if you attend, I...

read more

What is a Forensic Image?

‘Imaging a hard drive’ is a phrase that is commonly used for preserving the contents of a custodian hard drive or server. It can also be used to describe when a custodian hard drive is cloned. It is worth taking some time to understand the differences and the...

read more

Recovering Deleted Email

It’s important to understand that deleted email is not recovered or indexed using common litigation support or electronic discovery software. These applications only process email that is still visible within the email software. Some email recovery software can also...

read more

Recovering Files From Unallocated Space

Recovering data from a hard drive is one of the most common tasks during a computer investigation. Here are a few of the artifacts which computer investigators may retrieve from unallocated (free) space to assist in a case: * MS Office documents * Acrobat files (.pdf)...

read more

Preserving Suspect Media (Write Blockers)

When examining or processing the files on a hard drive, it is extremely important to retain the original file contents and time stamps. Many people don’t realize that just connecting a hard drive to a PC will alter the contents of the hard drive.  In order to preserve...

read more

Searching for Buried Treasure

Searching and identifying relevant content is a common process for both electronic discovery and computer forensic investigations. But some people don’t realize the challenges associated with indexing hundreds, or even thousands, of different file types and data...

read more

ESI (Electronically Stored Information) Winds of Change

Changes are underway in how electronically stored information (ESI) is processed and reviewed. These changes are due to the huge size of repositories - hundreds of gigabytes or multiple terabyte sizes - identified for collection and processing. Corporations and their...

read more

What does ‘CCE’ Mean?

The CCE (Certified Computer Examiner) is a certification obtained through ‘The International Society of Forensic Computer Examiners’ (ISFCE). I’ve noticed that many CCE training facilities are geared towards criminal investigations so they don’t necessarily address...

read more

Get in Touch with Us

Schedule a FREE demonstration or ask any question. We’d be happy to help.

  • This field is for validation purposes and should be left unchanged.

Let’s Connect at Legalweek!

March 24–27 | New York City

We’re showcasing CrossCopy Enterprise & CrossCopy Mobile—the future of cloud eDiscovery collections.

Book a meeting to see it in action!