All information that fits the defined criteria needs to be preserved. Once the duty to preserve is triggered, it needs prompt isolation to protect potentially relevant data in a legally defensible, reasonable, proportionate, efficient, and auditable way. At the same time,the approach has to be tailored to mitigate risks.
Electronically Stored Information (ESI) can be volatile. The metadata (information about the ESI) often provides context to files, with the only clues for searchibitlity identified during review stage. This requires metadata fields for electronic files - file name, original path information, author, subject, dates and times accessed, created, and last modified or saved - to be preserved in a forensically sound manner for authentication.
We understand the important procedures, methodologies, and tools needed to successfully preserve all documents and associated metadata.