We create a data map of the IT systems in question to locate potential sources of relevant ESI.
The goal of the e-discovery identification stage is to determine the scope, depth, and breadth of the ESI investigation. In this stage, e-discovery investigators figure out how much ESI is relevant and which form the relevant ESI takes, determine how it should be collected and preserved, and take steps toward inventorying the relevant ESI.
eDiscovery Identification Services
We conduct interviews with IT personnel & data custodians to create a preliminary plan for the upcoming preservation & collection stages of e-discovery.
To do this, our e-discovery investigators first create a data map of the IT systems in question to locate potential sources of relevant ESI. We also conduct interviews with IT personnel and data custodians to create a preliminary plan for the upcoming preservation and collection stages of e-discovery.
- Meet and Confer Conference (FRCP Rule 26(f)) consulting
- Data Mapping of complex IT Systems
- IT/Custodian Interviews
- Verification of third party data maps and data disclosures
We can assist you with FRCP Meet & Confer consultation as related to FRCP 26(b)(1).
Where Does ESI Come From? Potentially Relevant Sources of ESI
Every case is different, and the potential sources of ESI will vary depending on the situation. The question of whether or not a specific source of ESI is valid to an e-discovery situation has a different answer for every case and every client. That said, there are some common sources of ESI which an e-discovery consultant will often focus on during the identification stage. Below is a list of the most common sources of ESI.