Electronic Discovery and Computer Forensics
Expert-defined terms from the Advanced Certification in Legal Document Review course at London School of Business and Administration. Free to read, free to share, paired with a globally recognised certification pathway.
Electronic Discovery (eDiscovery) #
Electronic Discovery, commonly referred to as eDiscovery, is the process of iden… #
This process is crucial in legal proceedings, investigations, and regulatory compliance. eDiscovery involves the review of emails, documents, databases, voicemails, social media posts, and other forms of electronic data. The goal of eDiscovery is to locate relevant information that can be used as evidence in a case.
- Electronically Stored Information (ESI): Refers to any data that is stored ele… #
- Electronically Stored Information (ESI): Refers to any data that is stored electronically, which can include emails, documents, spreadsheets, images, videos, and more.
- Litigation Hold: A legal requirement to preserve all relevant ESI that may be… #
- Litigation Hold: A legal requirement to preserve all relevant ESI that may be subject to discovery in a legal proceeding.
- Data Mapping: The process of identifying where ESI is stored within an organiz… #
- Data Mapping: The process of identifying where ESI is stored within an organization's systems.
Example: #
Example:
During a lawsuit, the legal team used eDiscovery tools to search through the com… #
During a lawsuit, the legal team used eDiscovery tools to search through the company's email servers to find evidence of insider trading.
Challenges: #
Challenges:
One of the main challenges of eDiscovery is the vast amount of data that organiz… #
Additionally, ensuring the authenticity and integrity of the collected data can be difficult.
Computer Forensics #
Computer Forensics is the process of investigating and analyzing digital devices… #
This field involves the preservation, extraction, and analysis of data from computers, servers, mobile devices, and other electronic devices. Computer Forensics experts use specialized tools and techniques to recover deleted files, trace internet activity, and identify potential security breaches.
- Chain of Custody: The documentation of the handling and transfer of digital ev… #
- Chain of Custody: The documentation of the handling and transfer of digital evidence to ensure its integrity and admissibility in court.
- Data Carving: The process of extracting data from a storage device without rel… #
- Data Carving: The process of extracting data from a storage device without relying on the file system metadata.
- Volatile Data: Information stored in a device's memory that is lost when the d… #
- Volatile Data: Information stored in a device's memory that is lost when the device is powered off.
Example: #
Example:
A Computer Forensics expert was hired to investigate a data breach at a company… #
A Computer Forensics expert was hired to investigate a data breach at a company by analyzing the logs from the servers and identifying the source of the breach.
Challenges: #
Challenges:
One of the challenges of Computer Forensics is keeping up with rapidly evolving… #
Additionally, ensuring that the evidence collected is admissible in court requires careful documentation and adherence to legal standards.
Advanced Certification in Legal Document Review #
An Advanced Certification in Legal Document Review is a professional credential… #
This certification is typically obtained through specialized training programs that cover the legal principles, technologies, and best practices related to document review. Professionals with this certification are often sought after for complex litigation cases that involve large volumes of electronic data.
- Document Review Platform: Software used to organize, search, and review electr… #
- Document Review Platform: Software used to organize, search, and review electronic documents during the discovery process.
- Privilege Log: A document that lists all privileged documents that have been w… #
- Privilege Log: A document that lists all privileged documents that have been withheld from production during discovery.
- Quality Control: Processes used to ensure the accuracy and consistency of docu… #
- Quality Control: Processes used to ensure the accuracy and consistency of document review work.
Example: #
Example:
After completing the Advanced Certification in Legal Document Review, Sarah was… #
After completing the Advanced Certification in Legal Document Review, Sarah was hired by a law firm to review documents for a high-profile lawsuit involving intellectual property rights.
Challenges: #
Challenges:
Obtaining an Advanced Certification in Legal Document Review requires a signific… #
Additionally, staying up-to-date with changes in technology and legal regulations is essential for maintaining certification.