4 keys to authenticating electronically stored information
Abstract: Electronically stored information (ESI) plays a prominent role in today’s litigation but, like any evidence, it must meet the authentication threshold before it will be admitted at trial. Qualified experts can apply many techno¬logical tools to establish the authenticity of ESI. It’s important, however, to understand the limits of such tools, whether arguing for or against the authenticity. This article provides an overview of four tools that can prove critical to ESI authentication.