Consider These Steps When Using eDiscovery

August 22, 2017

E-Discovery allows attorneys to recover information in electronic format for litigation, investigations, and Freedom of Information Act requests. E-Discovery can be used to search keywords in emails, documents, and basically anything electronic. Rekall is proud to announce that we’re very well versed in E-Discovery, and are prepared with the appropriate programming to get the job done.

Let us dig deeper, and help breakdown what you might need when searching via e-discovery. These are just some of the components you should be requesting:

 

Metadata: All flies should contain at least a few of the following information.

  • File Name
  • File Creation/Modification Date
  • Send/Received/Modification Dates
  • Owner/Author
  • Most Recent Modification made by
  • Recipients including CC and BCC
  • Source Path
  • Subject/Email Title

 

Metadata is important for e-discovery because it’s the basic bare-bones of the information needed. Metadata provides deeper electronic information that wouldn’t normally show up on a document that was printed out.

 

The Difference between TIFFs and Natives Formatting

TIFF is generally an appropriate format, but sometimes you’ll need native formatting. Unfortunately, speaking notes in presentations, or different track changes/comments in documents can be lost in TIFF formatting. Some Microsoft applications will display jumbled data with TIFF formatting as well. Overall the information that is at stake with TIFF formatting is very important to your eDiscovery, and can be extremely useful for your case and client. Track changes/comments on documents are of the most importance.

 

Breaking down Documents

When requesting, it’s important to identify all types of documents and data. You need to give more information as far as documentation other than identifying that you need electronic and paper documents. Specify if you need unusual data, which you more than likely will. Unusual data would consist of online chats, texts, shared drives, different databases, voicemails, or any other recordings. On the flip side, the more specific you are with requesting documents, you’re probably going to need to produce those documents yourself as well.