eDiscovery Explained
The Ultimate Guide

What is eDiscovery?

Identification

Determining what data is required, who the custodians are (who has control over it) and where the data located.

Collection

Copying the data into a secure repository.

Production

Producing the information to the other party.

Preservation

Ensuring the identified data is not deleted or modified.

Processing, Review & Analysis

Reducing the collected data set down to relevant information.

Presentation

Presenting the information during trial.

Types of Electronically Stored Information (ESI)

Here’s some examples of data that could be identified as containing relevant information: Emails, Social Media Content, Text Messages, Voicemail, Instant Messages (Skype, Viber, WhatsApp etc.), Documents, Spreadsheets, Calendar Files etc. All data from these devices is known as ESI (electronically stored information).

Sources of Electronically Stored Information (ESI)

ESI can be collected from numerous devices, such as phones, tablets, laptops, desktops and any other source that stores electronic data, including, but not limited to networked drives and online sources such as websites, apps and databases in the cloud.

Understanding Metadata in Electronic Files

Many electronic files also have associated data called “metadata”. For example, an image file may have metadata that includes when the picture was taken, where the picture was taken, the camera model, etc. Document metadata may include properties such as when the document was created, last modified, the author’s name, the time spent editing etc.

The Impact of Big Data on ESI

All this ESI can add up to a lot of data, it even has a term – “Big Data”. Big data results in increased costs (more discovery data to analyze), and an increased risk of spoilage (improper handling of ESI).

eDiscovery Stages

As mentioned, the electronic discovery process consists of multiple stages. In 2005, a model was developed as a framework that outlines the stages. It’s called the Electronic Discovery Reference Model (EDRM).

Electronic Discovery Reference Model

The EDRM diagram represents a conceptual standard for the e-discovery process. Meaning that it does not have to be followed literally. It’s intended for discussion and analysis, rather than a definitive approach.
Information Governance

Information governance (IG) serves to support processes that an organization uses to maximize the value of its electronic information, while minimizing costs and risks associated with keeping that electronic information. It’s not really a step or stage in the eDiscovery process, it’s more about managing “big data” so that relevant data can be accessed quickly when needed.
Many organizations are yet to put IG into practice. That said, it is now becoming a conversation that many companies are starting to have.

  • After electronically stored information (ESI) had been identified and preserved, it must ultimately be collected and stored in a secure repository for review.
  • The collection stage is often the most complex stage of eDiscovery, requiring professionals from both IT and legal to collaborate and ensure the extraction process is properly executed.
  • Relevant ESI may be stored across many different types of data sources, each one requiring different collection methodologies to ensure the data is collected properly.

Here’s a list of some common data sources that ESI may need to be collected from for electronic discovery.

Archive Data

Active Data is ESI that is stored on local hard drives, network attached storage (NAS) or other networked drives. This includes emails and other traditional files that are stored on devices such as laptops, desktops, servers and network attached storage. This type of data is usually the easiest to access and collect.

Mobile Data

This category includes phones, smartphones, tablets and blackberry devices. Collecting ESI from these types of devices will generally require specialized knowledge and sophisticated tools.

Backups

ESI that has been moved to backup devices such as tape drives or disaster recovery systems. Backup systems often compress files, this makes it difficult to search and access files. Typically, the files will need to be restored first.

Cloud Data

More and more data is being stored in the cloud (remote data that is stored and accessed over the internet). This not only includes the corporation's own applications, it also includes data stored by third party service providers such as CRM and accounting software, instant messaging services (skype, slack), social media networks, storage services (Dropbox, OneDrive), etc. Accessing this type of data can be beyond the reach of internal IT and may require specialized help.

Offline Data

Offline Data is ESI that is sent to offline storage or is no longer active (no longer in use). Examples include old computers, old hard drives, portable hard drives, USB sticks, optical disks and archived data. Collection this type is data is relatively easy if the whereabouts are known.

Hidden Data

This can include deleted data, files and fragmented files. Deleted data is not visible through the regular operating system, but it may still exist. It’s possible to recover deleted data with specialized tools and/or software if the sectors have not been formatted or overwritten with new data.

Typical Collection Methods

Collection Service (outside service provider is engaged)

A third-party collection service, like QUiVX is used to perform the collection of ESI. These experts are likely to know the latest best practices, have all the specialized tools and follow set processes. Although it may come with increased cost, it may be worth it for organizations with little eDiscovery experience.

The final stage of the eDiscovery process. This is when the ESI is presented as evidence during trial. The legal team will develop a presentation strategy to show the information at trial.

Conclusion

Develop a strategy and plan for each legal discovery request. It is going to help reduce risks and costs.

Can your organization respond to a legal discovery request quickly? To avoid fines and legal sanctions, organizations need to be able to find relevant ESI quickly and easily.

Leveraging the EDRM framework will help you prepare and meet the deadlines of legal requests. Utilizing eDiscovery solutions will help you to be proactive and ready to respond efficiently, saving you time and money.

Ready to take the next step?

We’ll be happy to discuss your options and offer recommendations. QUiVX offers consulting and training at no additional cost on various database management tools to streamline the review process.

QUiVX understands the unique demands and processes legal professionals require during litigation.

Contact Info

Copyrights © 2025 | QUiVX eDiscovery | All Rights Reserved.

Scroll to Top