1
Identify
Initiate and manage legal hold, identify key players, custodians, and locations
2
Preserve & Collect
Perform a forensically defensible collection—one that preserves that all files and associated metadata remain unchanged
3
Assess & Strategize
Develop tailored forward-looking, and repeatable solutions and execute best practice workflow
4
Cull & Process
Reduce data sets using deduplication, deNISTing, file type, date range, and search terms before review
5
Review
Determine right technology fit, design efficient workflow, and provide expert project management
6
Produce
Exchange relevant, responsive data in most cost-effective and compliant manner