Best Practices

The Fundamentals of Document Management [Infographic]

Document management and control can be a complicated and daunting process, but ignoring it is a bad idea. Getting started is usually the hardest part…

8 Best Practices for Handling Electronic Evidence

Why does electronic evidence multiply? Why does it move or get renamed or even deleted? It does not do it on its own… so who is responsible and why?

Don’t Be Afraid of Document Management! | 7 Best Practices for Getting Started

“How do you eat an elephant? One bite at a time.” The same should apply to addressing information governance in your organization – no matter what size you are.

Uncovering ESI (Electronically Stored Information) – 20 Tips for Keyword Searching in eDiscovery

Any term less than four (4) characters may result in a lot of false positives…Be aware of “noise word” lists…Be aware that searching numbers can sometimes return unwanted results…

Rehashing: Using Hash Tables to Remove or Flag ESI in eDiscovery

So what’s a hash table? A hash is a calculated value of a defined set of data, such as a file or a string of text. A hash table is a collection of two or more hashes. You may be familiar with the term MD5 hash. This is an example of an MD5 hash value:

“f916b15e3982505acedb795af150c353”

It’s akin to a digital fingerprint and it’s basically meaningless.