Articles

10 Strategic Steps for Defensible Search

10 Strategic Steps for Defensible Search

As appeared in Bullseye - by Tino Kyprianou

E-Discovery in litigation today presents a number of challenges in creating a defensible, efficient, and iterative search protocol. A defensible keyword search protocol should contain, at a minimum, the following ten strategic steps: 1. Define the data you are looking for and determine where it is located. It’s important to first define and identify the

Learn More
Legal Strategy of Computer Forensics

Legal Strategy of Computer Forensics

As appeared New Jersey in Law Journal - by Tino Kyprianou

As technology advances by leaps and bounds, digital devices are now an integral part of our lives. Every day we use cell phones, laptops, iPads, iPods, GPS systems — the list is endless. A large part of our activities and transactions are captured on these devices or on a network server somewhere. So what happens

Learn More