An ESI agreement, also known as a discovery protocol, is an agreement between two or more parties in a lawsuit. Specifically, it deals with the processes, procedures, and timeline for how to exchange electronically stored information (ESI). Ideally, the best time to enter an ESI agreement or discovery protocol is at the outset of litigation while complying with Rule 26(f) meet and confer requirements. Commonly, the agreements will cover which devices or accounts, relevant date range, search terms, and data types subject to forensic collection.
We recommend collecting emails directly from the email server as opposed to collecting them from a phone or computer. Users tend to retain more emails on the email server than on a phone or computer. For example, on a phone, the user may set all emails to delete automatically after 30 days.
Yes, see our “Servers” page under the “Services” menu.
There are three ways we collect mobile phone evidence:
- Mobile Phone itself.
- Backups of the mobile phone on the computer.
- Backups of the mobile phone on a cloud service.
Our forensic software and collection procedures are fully defensible. Meaning, we protect your data integrity so you can use it for litigation if needed. We extract images, videos, text messages call logs, notes, voicemail and application data. In addition, we always maintain chain of custody and preserve the integrity of the evidence, so it can be admissible in court.
We are lawyers with a deep technical backgrounds. We can extract financial files (e.g. accounting files like Quicken and QuickBooks), and financial data in databases. If you need a detailed financial review for your legal case, we can recommend a forensic accountant or CPA.