Best Practices in Building Your Case and Locating Key Case Evidence
The proliferation of ESI sources requires an approach that expands beyond email. Understanding the IT profile of the custodian and utilizing a data map is instrumental in identifying the key sources of ESI. The growth in apps, collaboration platforms, cloud storage and the Internet of Things (IoT) devices has resulted in the exponential growth in quantity and complexity of ESI sources. A thorough custodian interview and data map is critical to uncovering and organizing all relevant data sources. The data map not only minimizes the risk of overlooking important ESI but reveals, at a glance, potential holes in your collection. This webinar offers a guide to conducting a comprehensive custodian interview and how to organize that information to create a defensible data map.
- Workflow and Case Development
- Why Interview Custodians?
- Custodian Identification
- Conducting Custodian Interviews
- What is Data Mapping?
- Benefits of Data Mapping
- Data Mapping log
- Data Mapping reports