Arkfeld's Best Practices Guide: Information Technology Primer for Legal Professionals, '12-'13 Edition
NEWLY REVISED March, 2012. This completely revised guide provides a much needed primer in understanding key technological concepts and the "information technology infrastructure" of organizations. Understanding these IT areas will enable legal professionals to properly apply e-discovery legal mandates such as a "legal hold" in their cases. Included is a new section entitled Information Technology Discovery Questions for clients, in depositions, interrogatories, and requests to produce.
• Overview of IT in organizations and the electronic discovery process
• ESI characteristics, forms, types, file systems and structure of data
• IT infrastructure of a company's IT people, hardware, software, networks. and backups
• Sources, storage, locations, metadata and concealment of ESI with a special emphasis on e-mail, databases and Internet data
• Identifying, locating and managing ESI using computer technology
This eBook features links to Lexis Advance for further legal research options.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Table of Contents
technology infrastructure of organizations locating electronically stored information E51
Computer Forensics Experts and Service Bureaus
About the Author
E Importance and Characteristics
Other editions - View all
application software archival audio backup tapes Best Practices Guide client computer files computer system connected contain converted copy cost court created Cross-references data files database deduplication deleted desktop disclosed Document Retention e-discovery e-mail messages electronic data electronic discovery electronic information electronically stored information employees encryption example fax server faxes file format filtering forensic gigabytes graphics hard drive hardware Identify Information Technology Internet Internet Service Provider Intranet laptop last visited Legal Hold Litigation Hold metadata Microsoft Outlook native file operating system organization organization’s paper passwords personal computer Personal Digital Assistant preserve printers procedures producing protocol records redaction relevant request Residual Data retention policies retrieve searchable Service Provider software applications software programs specific spreadsheet Steganography storage device Storage locations storage media TIFF types user’s voice mail Wikipedia word processing word processing documents