SlideShare a Scribd company logo
1 of 6
Forensic Collection of Electronically Stored
Information
By James Cortopassi
Posted November 9, 2015
In eDiscovery
0
0
A forensic collection is the acquisition and preservation of digital data. The collection is
an integral part of the eDiscovery process, and collections can be full (bit-for-bit) or
pointed to a subset of all data, depending on the case requirements. Once validated, a
defensible collection workflow can be offered for one’s case. The collected electronically
stored information (ESI) will then be culled, analyzed, and further validated, as needed.
Now, the culled data-set(s) can be prepared for review, coding and production during
litigation.
Where does the data come from?
The collection can be compiled from various sources. Anywhere that data can reside, data
can be found. Data can be collected from devices such as but not limited to; servers,
desktop computers, laptops, external hard drives, smart phones, and tablets. Additionally,
cloud-based applications (e.g., social media, web-share platforms, and certain email) can
be accessible by forensic professionals. Today, even deleted data can be recovered and
made available for review and analysis.
How is data collected?
When litigation presents a need for the collection of ESI, there are a several different
methods that can be exercised by a forensic professional.
• In-Person ESI Collection
This method involves an in-persona meeting with a forensic professional. The
forensic professional will be able to acquire data from multiple sources,
simultaneously, and immediately address any shifts in collection-scope. The
client’s IT team will typically assist in mapping the data retention infrastructure
prior to the acquisition taking place, in order to allow for a more seamless, efficient
approach to the collection efforts.
• Self-Collection Kit
This method is becoming more common amongst forensic professionals and their
clients. Like the in-persona approach, this method of collection can range from a
specific pointed location of interest to an extensive, broad acquisition of all ESI
available. This method is viewed favorably for its quick delivery, convenient hours
of collection, and cost-effectiveness.
• Remote Data Collection
Similar to Self-Collection Kits but requires a secure remote internet connection to a
designated server. This method must overcome the barriers of company security
policies restricting such access, and typically requires more oversight and IT
compliance than a self-guided kit.
Regardless of the method of collection one implements, all forms of forensic acquisition
will produce comprehensive reports and details as to the data-management approach best
suited for the matter. Typically, the forensic collection team will confer with the
attorneys as to the findings, and how the recovered data should be treated, considering the
scope, budget and exposure of the case at bar. Once data has been collected, data
culling methods can resume in order to narrow the review set even more.
The Benefits of a Certified Computer Examiner
There are many advantages of contacting a Certified Computer Examiner (CCE). The
data collection process can be overwhelming to some and, accordingly, should be
conducted by trained professionals. These trained professionals use the latest forensic
tools and procedures, as to avoid data-manipulation or spoliation. A CCE will be able to
guide through the data and present an outline. Those who contact a CCE for their services
should feel assured that they are moving forward in a legally defensible manner.
Educated:
In order to have become certified, these professionals must have completed courses and
have at least 18 months experience with collection tools. Every two years the professional
must re-certify their certification.
Fair:
As per The International Society of Forensic Computers, a CCE must “Provide a fair,
vendor neutral, uncompromised process for certifying the competency of forensic
computer examiners. ” This requirement will benefit any party looking for a CCE to
validate information for their case.
Defensible:
A CCE will be able to draft reports in-line with their independent findings. As a result of
the data acquisition efforts; such reporting will include details regarding the data sought,
location(s) where data was stowed, method(s) of collection, findings as to the clients
depicted scope and requirements, and the ability to defend such procedures at the trial or
hearing (by the way of testimony, if necessary).
Preservation and Security
When it comes to the integrity and authentication of the collected data, a proper chain of
collection/custody log will be established. The purpose of the log is to present
documentation of how the data originated. The log will detail how the data came to be
collected, the analysis of the data, and how the data was kept preserved until trial. The
chain of collection/custody log will corroborate the authentication of the evidence, as any
altercations to the data will need to be logged.
At LITeGATION we know the process of eDiscovery and how important it is to gather
forensic collections. No matter what the platform or device, our Certified Computer
Examiners (CCE) are prepared to help you develop a collection workflow, initiate the
proper data-acquisition, and get you prepared for the analysis of you responsive data.
For forensic collections or any litigation support service, contact to us today for a free
consultation.
James Cortopassi
James Cortopassi brings nearly 20 years of eDiscovery experience to his practice as a
leader in litigation support and eDiscovery coordination. Mr. Cortopassi has managed
thousands of cases involving forensic collections, data processing & hosted solutions,
managed document review, ESI productions, trial technology services, and workflow-
innovation.
Examiners (CCE) are prepared to help you develop a collection workflow, initiate the
proper data-acquisition, and get you prepared for the analysis of you responsive data.
For forensic collections or any litigation support service, contact to us today for a free
consultation.
James Cortopassi
James Cortopassi brings nearly 20 years of eDiscovery experience to his practice as a
leader in litigation support and eDiscovery coordination. Mr. Cortopassi has managed
thousands of cases involving forensic collections, data processing & hosted solutions,
managed document review, ESI productions, trial technology services, and workflow-
innovation.

More Related Content

More from James Cortopassi

About the E-Discovery Process
About the E-Discovery ProcessAbout the E-Discovery Process
About the E-Discovery ProcessJames Cortopassi
 
Three Bullying Prevention Tips for Parents
Three Bullying Prevention Tips for Parents Three Bullying Prevention Tips for Parents
Three Bullying Prevention Tips for Parents James Cortopassi
 
The children’s miracle network by james cortopassi
The children’s miracle network by james cortopassiThe children’s miracle network by james cortopassi
The children’s miracle network by james cortopassiJames Cortopassi
 
Children’s miracle network and rite aid launch 2013 balloon campaign by james...
Children’s miracle network and rite aid launch 2013 balloon campaign by james...Children’s miracle network and rite aid launch 2013 balloon campaign by james...
Children’s miracle network and rite aid launch 2013 balloon campaign by james...James Cortopassi
 

More from James Cortopassi (9)

Document services
Document servicesDocument services
Document services
 
Trial presentation 01
Trial presentation 01Trial presentation 01
Trial presentation 01
 
LITEGATION
LITEGATIONLITEGATION
LITEGATION
 
Litegation infographic
Litegation infographicLitegation infographic
Litegation infographic
 
About the E-Discovery Process
About the E-Discovery ProcessAbout the E-Discovery Process
About the E-Discovery Process
 
Electronic discovery
Electronic discoveryElectronic discovery
Electronic discovery
 
Three Bullying Prevention Tips for Parents
Three Bullying Prevention Tips for Parents Three Bullying Prevention Tips for Parents
Three Bullying Prevention Tips for Parents
 
The children’s miracle network by james cortopassi
The children’s miracle network by james cortopassiThe children’s miracle network by james cortopassi
The children’s miracle network by james cortopassi
 
Children’s miracle network and rite aid launch 2013 balloon campaign by james...
Children’s miracle network and rite aid launch 2013 balloon campaign by james...Children’s miracle network and rite aid launch 2013 balloon campaign by james...
Children’s miracle network and rite aid launch 2013 balloon campaign by james...
 

Recently uploaded

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxjohnpazperpetua10
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 

Recently uploaded (20)

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptx
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 

Forensic collection of electronically stored information

  • 1. Forensic Collection of Electronically Stored Information By James Cortopassi Posted November 9, 2015 In eDiscovery 0 0 A forensic collection is the acquisition and preservation of digital data. The collection is an integral part of the eDiscovery process, and collections can be full (bit-for-bit) or pointed to a subset of all data, depending on the case requirements. Once validated, a defensible collection workflow can be offered for one’s case. The collected electronically stored information (ESI) will then be culled, analyzed, and further validated, as needed. Now, the culled data-set(s) can be prepared for review, coding and production during litigation. Where does the data come from? The collection can be compiled from various sources. Anywhere that data can reside, data
  • 2. can be found. Data can be collected from devices such as but not limited to; servers, desktop computers, laptops, external hard drives, smart phones, and tablets. Additionally, cloud-based applications (e.g., social media, web-share platforms, and certain email) can be accessible by forensic professionals. Today, even deleted data can be recovered and made available for review and analysis. How is data collected? When litigation presents a need for the collection of ESI, there are a several different methods that can be exercised by a forensic professional. • In-Person ESI Collection This method involves an in-persona meeting with a forensic professional. The forensic professional will be able to acquire data from multiple sources, simultaneously, and immediately address any shifts in collection-scope. The client’s IT team will typically assist in mapping the data retention infrastructure prior to the acquisition taking place, in order to allow for a more seamless, efficient approach to the collection efforts. • Self-Collection Kit
  • 3. This method is becoming more common amongst forensic professionals and their clients. Like the in-persona approach, this method of collection can range from a specific pointed location of interest to an extensive, broad acquisition of all ESI available. This method is viewed favorably for its quick delivery, convenient hours of collection, and cost-effectiveness. • Remote Data Collection Similar to Self-Collection Kits but requires a secure remote internet connection to a designated server. This method must overcome the barriers of company security policies restricting such access, and typically requires more oversight and IT compliance than a self-guided kit. Regardless of the method of collection one implements, all forms of forensic acquisition will produce comprehensive reports and details as to the data-management approach best suited for the matter. Typically, the forensic collection team will confer with the attorneys as to the findings, and how the recovered data should be treated, considering the scope, budget and exposure of the case at bar. Once data has been collected, data culling methods can resume in order to narrow the review set even more. The Benefits of a Certified Computer Examiner There are many advantages of contacting a Certified Computer Examiner (CCE). The data collection process can be overwhelming to some and, accordingly, should be conducted by trained professionals. These trained professionals use the latest forensic tools and procedures, as to avoid data-manipulation or spoliation. A CCE will be able to guide through the data and present an outline. Those who contact a CCE for their services should feel assured that they are moving forward in a legally defensible manner. Educated: In order to have become certified, these professionals must have completed courses and have at least 18 months experience with collection tools. Every two years the professional must re-certify their certification. Fair: As per The International Society of Forensic Computers, a CCE must “Provide a fair, vendor neutral, uncompromised process for certifying the competency of forensic computer examiners. ” This requirement will benefit any party looking for a CCE to
  • 4. validate information for their case. Defensible: A CCE will be able to draft reports in-line with their independent findings. As a result of the data acquisition efforts; such reporting will include details regarding the data sought, location(s) where data was stowed, method(s) of collection, findings as to the clients depicted scope and requirements, and the ability to defend such procedures at the trial or hearing (by the way of testimony, if necessary). Preservation and Security When it comes to the integrity and authentication of the collected data, a proper chain of collection/custody log will be established. The purpose of the log is to present documentation of how the data originated. The log will detail how the data came to be collected, the analysis of the data, and how the data was kept preserved until trial. The chain of collection/custody log will corroborate the authentication of the evidence, as any altercations to the data will need to be logged. At LITeGATION we know the process of eDiscovery and how important it is to gather forensic collections. No matter what the platform or device, our Certified Computer
  • 5. Examiners (CCE) are prepared to help you develop a collection workflow, initiate the proper data-acquisition, and get you prepared for the analysis of you responsive data. For forensic collections or any litigation support service, contact to us today for a free consultation. James Cortopassi James Cortopassi brings nearly 20 years of eDiscovery experience to his practice as a leader in litigation support and eDiscovery coordination. Mr. Cortopassi has managed thousands of cases involving forensic collections, data processing & hosted solutions, managed document review, ESI productions, trial technology services, and workflow- innovation.
  • 6. Examiners (CCE) are prepared to help you develop a collection workflow, initiate the proper data-acquisition, and get you prepared for the analysis of you responsive data. For forensic collections or any litigation support service, contact to us today for a free consultation. James Cortopassi James Cortopassi brings nearly 20 years of eDiscovery experience to his practice as a leader in litigation support and eDiscovery coordination. Mr. Cortopassi has managed thousands of cases involving forensic collections, data processing & hosted solutions, managed document review, ESI productions, trial technology services, and workflow- innovation.