Avalon logo
  • Legal
  • Cyber
  • Docs
    • Avalon Docs Home
    • Business Process Outsourcing
    • Managed Office Services
    • Managed Secure Print & Mail
    • Managed Document Scanning
    • Meeting, Presentation & Training Materials
    • Secure Print & Mail
    • Marketing & Branding Materials
    • Printing & Copying
    • Document Imaging & Scanning
    • Large Format Printing
  • Plans
    • Avalon Plans Home
    • Bid Management/Online Planroom
    • Large Document Production
    • Managed Office Services
    • Meeting, Presentation & Training Materials
    • Document Imaging & Scanning
    • Large Format Printing
    • Printing & Copying
  • Our Team
  • About Us
    • History & Mission
    • Leadership
    • Avalon In the News
  • Testimonials
  • Blog
  • Resources
    • Case Studies
    • White Papers
    • Infographics
    • Videos
    • Slicks & Brochures
  • Planroom
  • Send us a File
  • Careers
  • Contact Us / Locations
Avalon logo

Forensic Imaging: A Better Approach to Electronic Discovery

Posted on October 14, 2013 by Team Avalon

Written By: Kyle Cavalieri, Chief Information Officer


electronic discovery

Proper preservation of electronic information is often not as simple as it seems.  In the world of computer forensics and electronic discovery, a simple ‘copy and paste’ of the relevant items may lead to issues further down the road.  It is imperative to ensure that the data has been preserved in a defensible manner to avoid any issues of spoliation.

When the files are touched by the parent operating system the information is tracked and stored, which modifies certain attributes of the files (known as metadata).  This modified information can raise concerns that the files have been altered or tampered with.  One of the main rules when dealing with electronic evidence is to never modify the original media, if at all possible.

Thus, the best way to collect electronic evidence is by creating a forensic image of the source media.  A forensic image will create a bit-for-bit copy of the original media, ensuring data accuracy.  These bit-level images include data that may have been deleted or otherwise not accessible to the end-user or operating system.  The forensic imaging tools will generate a mathematical checksum, also known as a hash value or digital fingerprint, on the source and target data.  As long as they both match, we can be sure the data is an authentic, exact duplicate of the original media.

These forensic images are vastly different that the ‘disk cloning’ or ‘disk mirroring’ tools widely used in the IT world.  The cloning tools, such as Symantec Ghost, are not designed to create bit-for-bit duplications; instead, they recreate the partition information and copy the active files as needed.  No deleted or inaccessible data is capture during the cloning.  In addition, these tools typically do not generate the mathematical hash values of the source and target.  However, if hash values were generated for the source and target it is highly likely that the results would be vastly different.  This may lead to issues in the court room!

While it is possible for internal IT staff to use cloning tools to ‘preserve’ certain data, the possible consequence must be kept in mind.  If an issue arises, will the IT personnel be able to defend the cloning process in court?  Hiring third-party forensic experts ensures that your data is preserved in a legally defensible manner.

If you liked this blog you might also be interested in reading: 4 Reasons Your Firm Should Outsource eDiscovery


Read our free case study to see how Avalon helped one client foil an elaborate kickback scheme orchestrated by a CTO.



Case Study: White Collar Fraud




Posted in Legal TechnologiesTagged computer forensics, digital fingerprint, electronic discovery, electronic evidence, electronic evidence collection, forensic imaging tools, metadata, Preservation of electronic information

Get news and helpful tips sent straight to your inbox

Sign me up!

Follow Team Avalon

Recent Posts

  • 6 Factors to Consider When Deciding Between Digital and Offset Printing
    September 20, 2018
  • The Power of Digital Print
    September 11, 2017
  • 8 Things to Consider Before Going Paperless
    July 19, 2017
  • How Do I Know If I’ve Been Hacked?
    June 21, 2017
  • Prevent Overspending on Copiers, Avoid These 4 Common Mistakes
    March 20, 2017

Tags

Avalon Buffalo Avalon Cleveland banner printing banners Bid distribution Cleveland Metropolitan Bar Association CMBA computer assisted review construction bid management construction signs cyber security data breach digital printing document review drawing printing E-discovery ediscovery ediscovery education electronically stored information electronic discovery electronic evidence email threading ESI facilities management Flyers holiday cards identity theft kCura legal technology specialist litigation litigation support metadata outsourcing bid management predictive coding printer printing Relativity review platform signage sign printer sign printing signs spec printing trade show displays trial boards
Get news and tips sent to your inbox
Sign me up!
Follow Team Avalon
linkedin logo facebook logo
Syracuse: 315.471.3333Rochester: 585.242.9999Buffalo: 716.995.7777Cleveland: 216.592.9999Tampa: 813.221.3266Michigan: 248.955.9200Omaha: 402.885.8800Phoenix: 602.975.4001

©2025 Avalon Document Services. All rights reserved | Privacy Policy | Terms of Use | Cookie Policy