Data Collection
Our team utilizes eDiscovery applications that allow for the quick, efficient and cost-effective capture of information across the business enterprise. Whether your data is structured (such as enterprise databases, accounting systems, collaboration tools), or unstructured (such as file servers, local machines, email) or even social media (Facebook, Twitter, LinkedIn), our team has the experience to collect your information.
Below is a summary of our approach toward data collection services:
- Cost Control: We believe that collection costs should be transparent, predictable and reasonable. Our team will provide cost estimates as soon as the conditions of the collection have been discussed with our corporate client’s IT staff and with outside counsel.
- Chain of Custody Preservation: Defensibility is key to the collection process. Our team has the experience to create custodian questionnaire and chain of custody forms to ensure the integrity of data collection efforts.
- Remote and International Reach: Collection services should global, simple and efficient. As several corporations have adopted strict information security guidelines, our technology portfolio allows for data to be collected remotely via any machine in the business enterprise in order to minimize cost, and headache associated with the approach used by other eDiscovery service providers which is having multiple individuals “on-site” collecting data for what could be days at a time.
- Targeted and Full Image Collections: To minimize costs, data should be not “over-collected” to the greatest extent possible. Our technology allows for the flexibility to not collect data which has no relevance to your matter by allowing for custodians or outside counsel to identify specific information that will need to be collected, but also allows for the flexibility to perform a more standard “forensic image” collection of the entirety of a local machine or file server.
- Competence in Business Management Tools: A collection should be informed by the type of data being collected. Our team has the expertise in business applications that corporations utilize which is essential towards creating efficiency and driving costs down for activities performed within the collection process itself.
- Security: The integrity of client information is paramount during collection. To maintain the highest level of information security standards, all data in transit via FTP, email or traditional mail is password protected in forensic evidence container files that maintain the highest levels of security encryption.