Our Certified eDiscovery consultants can assist you with the entire electronic discovery proces.
eDiscovery Analysis Stage
Complete eDiscovery analysis knowledge, tools, and techniques allow our consultants to perform defensible and accurate e-discovery.
Calling analysis a discrete stage of the EDRM is a bit misleading; analysis of ESI happens in some way, shape, or form at every step in the e-discovery process. Through the entire e-discovery process, our experts are constantly evaluating ESI (electronically stored information) for content and context, separating relevant data from irrelevant data, and finding key patterns across sets of relevant data. Complete e-discovery analysis knowledge, tools, and techniques allow our consultants to perform defensible and accurate eDiscovery.
- Analysis of Potential ESI Sources and Custodians
- Analysis of Automated Tasks that may Corrupt ESI
- Analysis of Collection Techniques and Results
- Analysis of File Metadata
- Analysis of File Contents
- Responsive Data
- Confidential Data
- Privileged Data
- Analysis of Production Results
Analysis is at the core of what we do
We bring years of combined Data recovery & Digital forensics background to the fore in our eDiscovery analysis services
At Gillware, analysis is at the core of what we do. Whether it’s our data recovery experts, our digital forensics investigators, or our e-discovery consultants, we are constantly analyzing IT systems, data sets and processes, and data storage of all shapes and sizes using advanced software tools and processes. Gillware Electronic Discovery brings years of combined data recovery and digital forensics background to the fore in our e-discovery analysis services.
Analysis of Potential ESI Sources and Custodians
– In the identification stage of the EDRM, e-discovery analysis answers the question of where the relevant ESI is coming from. Sources ranging from individual computers or workstations to entire servers can contain valuable ESI. During the identification stage, e-discovery analysis also identifies to which custodians relevant ESI may belong to.
Analysis of Automated Tasks that may Corrupt ESI
When preparing to preserve and collect ESI from the proper sources and custodians, our e-discovery consultants must carefully take into consideration any threats to ESI to plan an appropriate strategy and avoid spoliation of data. Automated tasks such as automatic backup and restore processes or automated data purging processes can complicate the data collection process and, if not properly dealt with, can result in data spoliation.
Analysis of Collection Techniques and Results
In the identification and review stages, our e-discovery consultants evaluate the data collection tools and techniques at our disposal. These range from industry-standard e-discovery platforms to proprietary analysis tools of our own design and custom-designed software tools. On a case-by-case basis, each tool at our disposal must be weighed by its own merits to choose the best techniques and methods for the proper preservation, collection, and production of relevant ESI.
Analysis of File System Metadata and File Contents
Analyzing file systems and files on sources of ESI allow our consultants to start identifying relevant data and stripping away irrelevant and unnecessary data. In the review stage, e-discovery analysis helps identify which forms of data should be produced and which should be withheld.
- Responsive Files: Responsive files are relevant to the case at hand and should be produced, whereas unresponsive files are irrelevant and need not be produced.
- Confidential Files: Confidential files contain data which is confidential and should not be produced.
- Privileged Data: Privileged data is protected under attorney-client privilege.
Analysis of Production Results
Gillware e-discovery consultants carefully review and analyze production results to ensure that no privileged or confidential information is being shared.
On-Site and Remote ESI Collection
When creating a plan to collect relevant ESI, the merits of collecting the ESI on-site or remotely must be weighed.