- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Litigation Services
- Login
- MITS
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Litigation Services
- Login
- MITS
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
June 23 | 12:00PM ET
This webinar on eDiscovery will go over sources of digital evidence, device data considerations, evidence authentication, deleted file recovery and implications of social media.
The topics covered in the presentation include:
Sources of Digital Evidence
A brief run-down of the various sources where digital evidence may exist, and where case teams should consider exploring with their clients - Device Data Considerations – a look at the breadth and scope of data types that may exist on electronic devices
Device Data Consideration
A look at the breadth and scope of data types that may exist on electronic devices
Evidence Authentication
Types of metadata that exist within various file types and data sources that should be at the forefront of legal professionals’ minds when engaging in data identification, preservation, and collection efforts
Deleted File Recovery
How data that a user thought they’d deleted can be recovered and leveraged in discovery
Social Media
a brief look at the implications of the interconnectivity of mobile devices and social media
Real World Examples
An exploration of situations where device data helped solve cases by Frontline investigators