Electronic Discovery

  1. San Diego Digital Forensics has experience in developing protocols that strive to identify responsive material while minimizing intrusion into the producing party's privacy and which allow for the protection of privileged/confidential information. Having reviewed many producing party's computer systems as an independent expert, special master or on behalf of the requesting party, SDDF is aware that it is possible to balance these conflicting needs. A protocol that requires SDDF to deliver all responsive data to the producing party for review, before production to the requesting party, often eliminates concerns regarding privilege/confidentiality. A protocol that addresses these concerns by the producing party typically involves the following general steps:
      1.     ⚬ Obtain a forensic image of the relevant digital media.
      2.     ⚬ Apply the agreed upon protocols. This may involve running text search terms, reviewing file system logs and artifacts, analyzing metadata, reviewing e-mail, recovering deleted data and other techniques.
      3.     ⚬ Prepare and provide responsive data to the producing party in a format that allows for review along with a privilege/confidentiality log.
      4.     ⚬ Provide the agreed upon privilege log to the opposing parties with only the file metadata, not the file content.
      5.     ⚬ Deliver allowed responsive data to the requesting party.