The identification phase is when potentially responsive documents are identified for further analysis and review. Custodians who are in possession of potentially relevant information or documents are identified. To ensure a complete identification of data sources, data mapping techniques are often employed. Since the scope of data can be overwhelming in this phase, attempts are made to reduce the overall scope during this phase - such as limiting the identification of documents to a certain date range or search term(s) to avoid an overly burdensome request.
FCSI's forensics will assist in extracting daa within the scope you specify.
During preservation, data identified as potentially relevant is placed in a legal hold. This ensures that data cannot be destroyed. Care is taken to ensure this process is defensible, while the end-goal is to reduce the possibility of data spoliation or destruction.
Electronic data from servers, individual computer hard drives, external media such as thumb drives, CDROM's and other storage devices are forensically imaged by FCSI so an exact copy of the asset is frozen in time.
Once that process is complete the physical evidence can be sealed and stored.
The forensic image obtained by FCSI, which is a pristine copy of the original asset, is stored in the event additional data is needed in the future.
Once documents have been forensically preserved, collection can begin. Collection is the transfer of data from a company to their legal counsel, who will determine relevance and disposition of data.
Some companies that deal with frequent litigation have software in place to quickly place legal holds on certain custodians when an event (such as legal notice) is triggered and begin the collection process immediately. Other companies may need to call in a digital forensics expert like FCSI to prevent the spoliation of data. The size and scale of this collection is determined by the identification phase.
It is highly recommended that a third-party forensic company perform the collection.
During the processing phase, native files are prepared to be loaded into a document review platform. Often, this phase also involves the extraction of text and metadata from the native files. Various data culling techniques are employed during this phase, such as deduplication and de-NISTing. Sometimes native files will be converted to a petrified, paper-like format (such as PDF or TIFF) at this stage, to allow for easier redaction and bates-labeling.
Modern processing tools can also employ advanced analytic tools to help document review attorneys more accurately identify potentially relevant documents.
Part of the processing typically involves computer forensics and FCSI will assist in preparing documents to be loaded into a document review system.
Forensic Computer Service delivers the content to the processor of your choice while retaining the entire set of data for each asset.
During the review phase, documents are reviewed for responsiveness to discovery requests and for privilege.
Different document review platforms can assist in many tasks related to this process, including the rapid identification of potentially relevant documents, and the culling of documents according to various criteria (such as keyword, date range, etc.).
Most review tools also make it easy for large groups of document review attorneys to work on cases, featuring collaborative tools and batches to speed up the review process and eliminate work duplication.