1. How many times have you thought you over-collected on a case?
2. Are your current service provider’s collection methods efficient and defensible?
3. Would you like to find out how analytics and sampling can reduce collection time and costs?
4. Do you have a collection problem or question we may assist you with?
On a case, you can potentially have many custodians with many documents in many locations that used different machines with different operating systems and different software programs. Do you collect it all? Do you have to collect it all? No, you do not. We have developed methodologies to solve the problem of over-collecting data.
We can collect and organize your data – we’re the front end of any operation that allows you to see your data in one place, tagged, organized and ready for review. We design custom samples that guarantee efficient reviews and cover multiple issues in one step.
Data Collection is one stage in the full range of activities that are needed for litigation support. Our platform – Viewpoint – integrates all of these activities. Data acquisition and collection into a system that is also going to process and analyze the data can help you rapidly and accurately acquire potentially relevant electronically stored information (ESI) to meet litigation or government investigative requirements for audits, investigations and litigation.
Data Collection and Computer Forensics require expertise and programs that exceed standard preservation and collection techniques available to your in-house data support.
Using a defensible chain-of-custody procedures and industry standard software such as Viewpoint, our team of collection experts can help you investigate, plan, gather, preserve, and analyze ESI. We can help in handling encrypted or password protected files, hidden or deleted files, damaged or corrupt files.
Data collected is preserved in pristine condition, with a defensible chain-of-custody that will comply with any court order:
• Reports with supporting documentation to comply with court requests or any level of technical sophistication
• Recover deleted items that have not been overwritten.
• Collection from laptops, desktops, network servers, portable devices, external drives.
• Forensic and Data Harvesting Capabilities
• Mirror imaging of all data sources
• On-site or off-site data acquisition
• Strict chain of custody protocols for proper evidence handling
• Document and file recovery, including deleted files
• Analysis of recovered data
• Expert testimony in legal proceedings