An ESI agreement, also known as a discovery protocol, is an agreement between two or more parties in a lawsuit. Specifically, it deals with the processes, procedures, and timeline for how to exchange electronically stored information (ESI). Ideally, the best time to enter an ESI agreement or discovery protocol is at the outset of litigation while complying with Rule 26(f) meet and confer requirements. Commonly, the agreements will cover which devices or accounts, relevant date range, search terms, and data types subject to forensic collection.
Typically, the best source of email evidence is the email server. While emails may be found in multiple locations such as on a phone, tablet, or computer, those locations tend to hold fewer emails than the server. For example, many phone users have their emails synced for only 30 days, and maybe only six months on their computer. Whereas the email server may have three years or more worth of email. Therefore, frequently the email server is the preferred source of evidence.
Yes, see our “Servers” page under the “Services” menu.
There are three ways we collect mobile phone evidence:
- Mobile Phone itself.
- Backups of the mobile phone on the computer.
- Backups of the mobile phone on a cloud service.
Our forensic software and collection procedures are fully defensible. Meaning, we protect your data integrity so you can use it for litigation if needed. We extract images, videos, text messages call logs, notes, voicemail and application data. In addition, we always maintain chain of custody and preserve the integrity of the evidence, so it can be admissible in court.
We are lawyers with a deep technical backgrounds. We can extract financial files (e.g. accounting files like Quicken and QuickBooks), and financial data in databases. If you need a detailed financial review for your legal case, we can recommend a forensic accountant or CPA.