Arkfeld's Best Practices Guide: Information Technology Primer for Legal Professionals

This completely revised guide provides a much needed primer in understanding key technological concepts and the "information technology infrastructure" of organizations.
Publisher: LexisNexis
eBook :mobi
2020-2021 Edition
In Stock
ISBN: 9781522192978
Publisher: LexisNexis
International Order Inquiry
Book Edition: 20-21E

Product details

View a sample of this title using the ReadNow feature

The new edition of Arkfeld's Best Practices Guide: Information Technology Primer for Legal Professionals, is a resource for understanding the "information technology infrastructure" of organizations, locating "electronically stored information" (ESI), and managing it using computer technology. This primer is intended to be used as a general reference for the identification, preservation, collection and disclosure of ESI.

Contents include:

  • Overview of IT in organizations and electronic discovery
  • Characteristics & forms of "electronically stored information" (ESI)
  • IT infrastructure: people, hardware, software, networks 
  • ESI file system, concealment and types 
  • ESI sources and locations
  • Using computer technology to search, identify, filter, review, produce and present ESI

Discounts are available on multiple copies for your law firm, government agency, or other legal organization. Call 1-800-533-1637. Visit our E-Discovery Page for additional information.

eBooks, CDs, downloadable content, and software purchases are non-cancellable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis Advance® for further legal research options. A valid subscription to Lexis Advance® is required to access this content.

Featured Authors

Table of Contents

CHAPTER 1   Overview of Information Technology (IT) and Electronic Discovery

CHAPTER 2   Characteristics & Forms of "Electronically Stored Information (ESI)"

CHAPTER 3   IT Infrastructure: People, Hardware, Software and Networks

CHAPTER 4   ESI File System, Concealment and Types

CHAPTER 5   ESI Sources and Locations

CHAPTER 6   Using Computer Technology to Search, Identify, Filter, Review, Produce and Present ESI