- 5 Security Measures Law Firms Must Have
- About Frontline
- Account Administration
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Digital Forensics
- Document Review
- eDiscovery
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Legal Operations Powered by ServiceNow
- IT Managed Services
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 5 Security Measures Law Firms Must Have
- About Frontline
- Account Administration
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Digital Forensics
- Document Review
- eDiscovery
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Legal Operations Powered by ServiceNow
- IT Managed Services
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
June 23 | 12:00PM ET
This webinar on eDiscovery will go over sources of digital evidence, device data considerations, evidence authentication, deleted file recovery and implications of social media.
The topics covered in the presentation include:
Sources of Digital Evidence
A brief run-down of the various sources where digital evidence may exist, and where case teams should consider exploring with their clients - Device Data Considerations – a look at the breadth and scope of data types that may exist on electronic devices
Device Data Consideration
A look at the breadth and scope of data types that may exist on electronic devices
Evidence Authentication
Types of metadata that exist within various file types and data sources that should be at the forefront of legal professionals’ minds when engaging in data identification, preservation, and collection efforts
Deleted File Recovery
How data that a user thought they’d deleted can be recovered and leveraged in discovery
Social Media
a brief look at the implications of the interconnectivity of mobile devices and social media
Real World Examples
An exploration of situations where device data helped solve cases by Frontline investigators