Home
Explore
Exams
Search for anything
Login
Get started
Home
Social Studies
Government
Laws
ESI Protocol
0.0
(0)
Rate it
Studied by 2 people
View linked note
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/10
Earn XP
Description and Tags
Government
Laws
Add tags
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
11 Terms
View all (11)
Star these 11
1
New cards
________ is for Outlook and mBOX is for Gmail.
PST
2
New cards
________: Retrieve data direct from source, not forwarded from the client. Changes the metadata.
How to avoid finger prints and why
3
New cards
________: Is an algorithm used to verify data integrity; used to make sure that files haven't been duplicated or modified.
MD5 Hash
4
New cards
________: is data about the data; date, time, location.
Metadata
5
New cards
A(n) ________ is a mutually agreed upon plan on how both sides will access data and eventually make it available to opposing side.
ESI protocol
6
New cards
________: Parties identify and eliminate inessential data so that it doesnt overwhelm efforts.
Defensible deletion
7
New cards
________: Owner of the inbox or data.
Custodians
8
New cards
Dont have client forward emails directly to you, it changes the meta data
Avoid fingerprints
9
New cards
Parties meet and negotiate a plan that will reduce costs and burdens for both sides
Meet and Confer
10
New cards
zip folder for inbox
PST and mBox
11
New cards
Parties identify and eliminate inessential data so that it doesnt overwhelm efforts
Defensible deletion