CDS Legal - 52 eDiscovery Terms Flashcards
Evidence that is allowable in court.
Admissable
The term used to refer to the various technologies used to provide multiple views into the data set.
Analytics
Long term repository for the storage of records and files.
Archive
A document or file that is connected to another document or file either externally, e.g. a document connected to an email, or embedded, e.g. an image in a word processing document.
Attachment
Both the action of and the result of creating a copy of data as a precaution against the loss or damage of the original data.
Attachment Backup
Portable media used to store copies of data that are created as precaution against the loss or damage of the original data.
Backup tape
The processing of a large amount of EDI in a single step.
Batch Processing
The processing, tracking and recording the movement, handling and location of electronic evidence chronologically from collection to production. It is used to verify the authenticity of the ESI.
Chain-of-Custody
A file that is attached to another communication file. E.g. the attachment to an email or a spreadsheet imbedded in a word processing document.
Child Document
A single file containing multiple documents and/or files, usually in a compressed format; e.g. zip, car, pst.
Container File
Most often refers to the individual from whose file systems a group of records were extracted. This person is not necessarily the author of the documents.
Custodian
The process of parsing data from electronic documents to identify their metadata and body contents
Data Extraction
The process of identifying and recording the location and types of ESI within an organization’s network, and policies and procedures related to that ESI.
Data Mapping
The process of comparing the characteristics of electronic documents to identify and/or remove duplicate records to reduce review time and increase coding consistency.
De-duplication, De-duping.
The process of separating documents generated by a computer system from those created by a user. This automated process utilized a list of file extensions developed by the National Institute of Standards and Technology.
De-NIST
The process of identifying, securing, reviewing information that is potentially relevant to the matter and producing information that can be utilized as evidence in the legal process.
Discovery
All parts of a group of documents that are connected to each other for purposes of communication; e.g. an email and its attachments.
Document Family
The eDiscovery process as it is practiced in the European Union
e-Disclosure
The process of identifying, preserving, collection, preparing, reviewing and producing ESI in the context of a legal or investigative process.
ediscovery, e-discovery. Electronic discovery
Information that is stored in an electronic format. This is used to prove or disprove the facts of a legal matter.
Electronic evidence
An electronic communication sent or received via a data application designed for that purpose. (e.g. MS Outlook, Lotus, Notes, Google Gmail)
Electronically stores information.
ESI
The process of applying specific parameters to remove groups of documents that do not fit those parameters, in order to reduce the volume of the data set, e.g. date ranges and keywords.
Filtering
The handling of ESI including collection, examination and analysis, in a manner that ensures its authenticity, so as to provide for its admission as evidence in a court of law.
Forensics
The rules that govern ediscovery and other aspects of the civil legal process.
Federal Rules of Civil Procedure, FRCP
An algorithm that generates a unique value for each document. It is referred to as a digital fingerprint and is used to authenticate documents and to identify duplicate documents.
Hash
To make an identical copy of a drive including its empty space, “mirror image”.
Image (Drive)
To make a picture copy of a document. The most common image formats in ediscovery are tiff and pdf.
Image (File)
Data whose format has become obsolete.
Legacy Data
A communication requesting the preservation of information that is potentially relevant to current or a reasonably anticipated legal matter and the resulting preservation.
Legal Hold
A file used to import data into an ediscovery system. It defines document parameters for imaged documents and often contains metadata for all ESI it relates to.
Load File
The device used to store electronic information, e.g. hard drives, back up tapes, DVDs.
Media
Often referred to as data about data. it is the information that describes the characteristics of ESI, e.g., sender, recipient, author, date. Much of the metadata is not accessible to non-technical users.
Metadata
A file that is maintained in the format in which it was created. This format preserves metadata and details about the data that might be lost when the documents are converted to image format. e.g. pivot tables in spreadsheets.
Native Format
Two or more files that contain a specified percentage of similarity. Also, the process used to identify those nearly-identical files.
Near-duplicate
Reformatting data so that it is stored in a standardized format.
Normalization
The process of converting images of printed pages into electronic text.
Optical Character Recognition, OCR
A document to which other documents/files are attached.
Parent Document
A document categorization process that extrapolates the tagging decisions of an expert reviewer across a data set. It is an iterative process that increases accuracy with multiple training passes.
Predictive Coding
In search results analysis, _____ is the measure of the level of relevance to the query in the results set of documents.
Precision
The ediscovery workflow which ingests data, extracts text and metadata, and normalizes the data. Some systems include the data indexing and de-duplication in their processing workflow.
Processing
The delivery, to the requesting party, of documents and ESI that meet the criteria of the discovery request
Production
In search results analysis, _____ is the measure of the percentage of total number of relevant documents in the corpus returned in the results set.
Recall
To intentionally conceal, usually via an overlay, portions of a document considered privileged, proprietary or confidential.
Redact
The process of looking within a data set using specific criteria (a query). There are several types of search ranging from simple keyword to concept searches that identify documents related to the query even when the query term is not present in the document.
Search
The unused portion of a disk that exists when the data does not completely fill the space allotted for it. This space can be examined for otherwise unavailable data.
Slack space
The destruction or alteration of data that might be relevant to a legal matter.
Spoliation
Data stored in a structured format such as a database. _______ can create challenges in ediscovery.
Structured Data
_________ is a common graphic file format. The file extension related to this format is ___.
TIFF, .tif
Most often, this is space created on a hard drive when a file is marked for deletion. This space is no longer allocated to a specific file. Until it is overwritten, it still contains the previous data and can often be retrieved.
Unallocated space
The code standard that provides for uniform representation of character sets for all languages. It is also referred to as a _____________.
Unicode, double-byte language.
Data that is not stored in a structured format such as word processing documents and presentations.
Unstructured data