Never limited by location, the new normal is our routine.

Image

Remote Collections

ID offers a regulated and technology-agnostic approach to executing remote collection of mobile devices, desktops, laptops, network shares, and email servers. These collections are performed by monitored examiner processes and use a combination of forensically-sound tools and methodologies. Regardless of whether your data is traditional in nature, or a variety of new, emerging data types, ID provides you with flexibility AND a collection you can have confidence in.

Hover over the tiles to learn about ID’s SAFE remote collection process:

Click on the tiles to learn more about ID’s SAFE remote collection process:

Send

.

Send

ID creates and ships the custom forensic remote collection kit, configured to the specific needs of the client.

Attach

.

Attach

Our seasoned forensics experts work with the client to connect devices and begin supervised remote forensic collection process.

Forward

.

Forward

Client ships and transfer devices and chain of custody to ID’s data intake team to create working copies and catalog data.

Examine

.

Examine

The ID forensics team perform examination and analysis of collected data and present results to the client.

Click on Nate Latessa, VP of Corporate Services, for a short video on how ID’s remote digital collections work!

Evidence Handling (FTPS/Parcel Service)

Whether digital evidence is transferred physically or electronically, ID maintains best practices for defensible evidence handling. No matter the source or condition of any received data, we require a chain of custody (CoC) to record the sequence of custody, control, transfer, analysis and disposition of physical and electronic evidence.

Image

ShareFile Access

ID offers ShareFile access for electronic evidence transfer, which is client segregated and encrypted both at rest and in-transit and uses cryptographic algorithms that comply with standard security practices.

FTP

For data sourced from external sources, FTP over SSL is used to transfer data to data center. The CoC includes a detailed inventory of the size and type of data being transferred as well as the people involved in the transfer and reception.

Parcel Service

Evidence shipped via a parcel service requires additional care. Pictures of the device are imperative to maintaining defensibility. We preserve package tracking information along with chain of custody.

Forensic Experts

ID’s forensic examiners confirm that the data matches the description in the CoC and create a full working copy on our network while ensuring no original data is modified.

Image

Processing

Our team works together with you to create customized workflows and export profiles so that targeted data sets are sent for review as quickly as possible. We utilize best-of-breed technologies and software carefully selected to better our clients’ experience and results.

Data Culling

.

.

Narrow your data set through culling methods such as deduplication, email threading, multiple date filters, and file type culling.

Technology

.

.

We employ Nuix and Relativity to ensure all data is identified, captured, and analyzed.

Data Quality

.

.

ID takes every step necessary to preserve the integrity of your data.

Scale & Security

.

.

Process terabytes of data daily without losing the attention to detail every case deserves.

Cloud Hosting

Secure Cloud Environment

FedRAMP Authorization

Our highly-sought-after FedRAMP accreditation allows us to offer a secure, cloud-based environment for government data, and parlay those best practices to our business environments.

Secure Data Centers

SSAE 16 Type II data centers with rapid-response disaster recovery capabilities, biometric iris scanners, and a highly redundant architecture.

Expertise

We are seasoned experts on industry-leading platforms and hold a wealth of Relativity certifications. We believe in finding the right tool for you, and being prepared to execute it flawlessly.

Redundancy

Maintaining multiple, different Border Gateway Protocol connections, via different carriers, as well as multiple ISPs which provide connectivity to all ID facilities.

How We Secure Your Review

Non Disclosure Agreement

.

.

All remote reviewers are required to sign an NDA tailored specifically for remote work

Citrix

.

.

Remote review utilizes technology identical to our on-prem solution and made available over the internet via Citrix Application Delivery Controller and Storefront server. All remote traffic is encrypted via SSL/TLS1.2 and proxied/secured by Citrix ADC and our Firewall appliances. All the same users, applications, machines and security controls that are in place locally are now viewable via a browser or Citrix Receiver client remotely.

Reporting

.

.

ID provides a variety of reporting metrics to clients for remote reviews, similar if not identical to reports provided for on-site review projects. These review metrics can include individual rates of review, overall review progress, and rates of responsiveness, privilege, and non-responsiveness.

User Access

.

.

As with any on-site review project, remote reviewer access is strictly limited to client-approved sites (i.e., Relativity) and materials of their assigned project. As an additional level of security, ID offers 2-Factor Authentication for user access.

Review Materials

.

.

All review materials are available electronically an only accessible via the remote desktop.

Remote Desktop

.

.

All remote reviewers are only able to access Relativity, their ID email accounts, and the electronic review materials via the remote desktop, which does not allow remote reviewers to download, copy, or print any materials on/to their personal assets..

Email Security

.

.

All project-related emails are transmitted via ID email accounts only, which does not allow emails to be sent outside ID’s environment (e.g. forwarding to personal email). Remote reviewers’ access to ID email accounts are terminated immediately upon completion of review and no personal email accounts are permitted.

Secure Data Center

.

.

All data remains in our secure data center and no client data is sent to the remote client machines.

Experienced Remote Reviewers

.

.

ID utilizes a strong bench of return review attorneys that have repeatedly demonstrated their experience and professionalism. We have cultivated tested and durable best practices that we implement in every review – in-house or remote.

Umbrella Services

Remote Project Management

Innovative Discovery’s project managers look at every project holistically and consult with you every step of the way. Our PMs are invest themselves into the client’s experience, making themselves available to you 24/7.

Security

ID is committed to providing the highest quality service, support, and data security to our clients, and we have invested in the best technologies available and recruited some of the industry’s top professionals to realize this end.