Episode 24 — Orchestrate legal collection workflows that are targeted and defensible

The collection phase of e-discovery requires a surgical approach to gather relevant data without over-collecting unnecessary or privileged information. This episode explores the technical workflows used to extract Electronically Stored Information (ESI) from various sources, including cloud storage, mobile devices, and legacy servers. For certification, it is critical to understand the principle of "proportionality," which balances the burden of collection against the value of the information to the case. In the real world, a defensible collection must be performed by trained professionals using validated forensic tools to ensure data remains unchanged. A common mistake is allowing users to "self-collect" their own data, which often leads to incomplete results and a loss of metadata. By orchestrating targeted and well-documented collection efforts, you provide your legal team with the accurate evidence they need while minimizing organizational disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 24 — Orchestrate legal collection workflows that are targeted and defensible
Broadcast by