{"id":630,"date":"2025-01-03T16:27:00","date_gmt":"2025-01-03T16:27:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=630"},"modified":"2024-11-20T16:28:14","modified_gmt":"2024-11-20T16:28:14","slug":"what-is-ediscovery-and-how-does-it-work","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/","title":{"rendered":"What Is eDiscovery and How Does It Work?"},"content":{"rendered":"\n<p>eDiscovery, short for \u201celectronic discovery,\u201d is the process of identifying, collecting, preserving, and analysing electronically stored information (ESI) for use as evidence in legal proceedings, investigations, or regulatory compliance. As much of today&#8217;s communication and data storage occurs in digital formats, eDiscovery has become essential in the legal landscape, particularly when seeking to obtain relevant information from the large volumes of data produced in modern business and personal activities.<\/p>\n\n\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Why eDiscovery is Important<\/strong><\/h4>\n\n\n\n<p>In legal proceedings and investigations, <a href=\"https:\/\/3bdatasecurity.com\/eDiscovery.php\">eDiscovery<\/a> enables legal and compliance teams to efficiently and accurately access digital evidence, making it possible to substantiate claims, uncover critical details, and uphold fairness in the discovery process. This digital evidence can reveal communication patterns, confirm events, or even identify misconduct. By employing eDiscovery, legal teams can build stronger cases while reducing the risk of overlooking critical information.<\/p>\n\n\n\n<p>For organisations, eDiscovery is also key in preventing legal disputes from escalating. By promptly responding to discovery requests with organised, compliant responses, companies can minimise potential legal liabilities. eDiscovery can also support internal investigations, helping identify potential issues before they become costly legal challenges. This goes hand-in-hand with other concepts such as Data Loss Prevention (DLP).<\/p>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Types of Electronically Stored Information (ESI)<\/strong><\/h4>\n\n\n\n<p>ESI encompasses a wide range of digital content, including:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Emails<\/strong> &#8211; Often a primary focus in eDiscovery, emails contain discussions, instructions, agreements, and decisions that can be valuable in tracing communication history or identifying relevant parties.<\/li>\n\n\n\n<li><strong>Chat<\/strong> &#8211; Conversations, messages and documents shared by instant messaging tools, such as Teams or Slack can contain valuable data and show links between people.<\/li>\n\n\n\n<li><strong>Documents<\/strong> &#8211; Files such as Word documents, PDFs, and presentations can reveal detailed information about business transactions, contracts, or internal communications.<\/li>\n\n\n\n<li><strong>Databases<\/strong> &#8211; Structured databases can hold vast amounts of information on sales, customer interactions, inventory, and more, which can support data-intensive investigations or uncover patterns over time.<\/li>\n\n\n\n<li><strong>Social Media Content<\/strong> &#8211; Posts, comments, and messages from social media platforms may reveal intentions, activities, or claims, and are increasingly relevant as social media use becomes integral to communication.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How eDiscovery Works<\/strong><\/h4>\n\n\n\n<p>eDiscovery follows a structured process to manage ESI for legal or investigative purposes:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Identification<\/strong>: Relevant data sources, such as emails, documents, and databases, are pinpointed, and key custodians are identified.<\/li>\n\n\n\n<li><strong>Preservation<\/strong>: Data is secured to prevent alteration or deletion, often using litigation holds or backups.<\/li>\n\n\n\n<li><strong>Collection<\/strong>: Relevant data is extracted while maintaining its integrity and metadata.<\/li>\n\n\n\n<li><strong>Processing<\/strong>: Irrelevant and duplicate data is filtered out, leaving only what\u2019s necessary.<\/li>\n\n\n\n<li><strong>Review<\/strong>: Data is assessed for relevance, responsiveness, and privilege using manual or automated tools.<\/li>\n\n\n\n<li><strong>Production<\/strong>: The finalised data is delivered in a standard format for legal proceedings.<\/li>\n<\/ol>\n\n\n\n<p>This process ensures digital evidence is managed effectively and aligns with legal and regulatory standards.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Benefits of eDiscovery<\/strong><\/h4>\n\n\n\n<p>eDiscovery is crucial in meeting legal and regulatory obligations, as it helps organisations maintain proper record-keeping practices and respond to legal inquiries or government requests in an organised, timely manner. For instance, in regulated industries like finance and healthcare, eDiscovery ensures that all relevant information is accessible and secure, which helps avoid penalties for non-compliance. It also helps companies adhere to privacy laws and regulations, such as GDPR, by managing and protecting sensitive data appropriately.<\/p>\n\n\n\n<p>In the digital age, eDiscovery offers businesses a range of advantages, from enhancing operational efficiency to enabling better compliance and strategic decision-making. Here are some key benefits:<\/p>\n\n\n\n<p><strong>Streamlined Data Retrieval Process<\/strong> &#8211; eDiscovery tools streamline data retrieval by automating the process of locating, collecting, and organising relevant data across multiple systems and devices. This automation reduces the need for manual data searches, saving valuable time and resources. By quickly pinpointing relevant information, businesses can minimise disruptions and allocate their legal teams to higher-value activities.<\/p>\n\n\n\n<p><strong>Cost-Effectiveness through Advanced eDiscovery Tools<\/strong> &#8211; With the help of advanced eDiscovery software and artificial intelligence, businesses can significantly reduce the cost of data review and analysis. These tools can categorise, tag, and prioritise data based on relevance, reducing the amount of data that legal teams need to review manually. As a result, businesses experience lower legal fees and fewer resource-intensive procedures, leading to substantial cost savings.<\/p>\n\n\n\n<p><strong>Ensuring Legal and Regulatory Compliance<\/strong> &#8211; eDiscovery is essential for businesses operating in highly regulated industries, such as finance, healthcare, and telecommunications, where record-keeping and transparency are critical. eDiscovery tools ensure that all relevant information is preserved, organised, and easily accessible, allowing businesses to promptly respond to discovery requests or regulatory audits. This proactive approach helps businesses maintain compliance and avoid penalties associated with non-compliance. This fits in with DLP processes too, allowing additional security on certain key data types that must be protected.<\/p>\n\n\n\n<p><strong>Managing Legal Risks and Avoiding Penalties<\/strong> &#8211; By efficiently preserving and retrieving critical data, eDiscovery supports a company\u2019s ability to defend itself in legal disputes or investigations. Proper use of eDiscovery reduces the risk of overlooking important information, thus strengthening the company\u2019s legal position. This minimises exposure to lawsuits, fines, and potential reputational damage, offering peace of mind in the face of complex legal and regulatory requirements.<\/p>\n\n\n\n<p><strong>Uncovering Critical Information and Insights<\/strong> &#8211; Beyond legal proceedings, eDiscovery tools help businesses analyse vast amounts of digital data to reveal trends, patterns, and critical insights. For instance, reviewing communication patterns might uncover inefficiencies, compliance issues, or even areas of potential innovation. Access to these insights enables management to address risks proactively and optimise internal processes.<\/p>\n\n\n\n<p><strong>Supporting Informed Business Decisions <\/strong>&#8211; Businesses can leverage findings from eDiscovery to guide strategic decision-making. For example, data from past transactions, communication threads, or customer interactions can inform strategies for risk management, customer service, or product development. This ability to mine historical data for actionable insights ultimately supports smarter, data-driven decisions that can improve operations and drive growth.<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>eDiscovery is an invaluable tool for navigating today\u2019s legal landscape. It ensures that digital evidence is efficiently gathered, compliant with regulations, and supportive of fair legal proceedings. As technology continues to evolve, the importance of eDiscovery will only grow, reinforcing the need for companies and legal professionals to stay adept at managing digital information effectively.<\/p>\n\n\n\n<p>At 3B Data Security, our eDiscovery experts provide end-to-end support, from identifying and preserving data to analysis and production. Whether you&#8217;re responding to legal requests or conducting internal investigations, we\u2019ll help you handle your electronically stored information efficiently and securely.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/eDiscovery.php\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png\" alt=\"Find Out More\" class=\"wp-image-257\" style=\"width:202px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>eDiscovery, short for \u201celectronic discovery,\u201d is the process of identifying, collecting, preserving, and analysing electronically stored information (ESI) for use as evidence in legal proceedings, investigations, or regulatory compliance. As much of today&#8217;s communication and data storage occurs in digital formats, eDiscovery has become essential in the legal landscape, particularly when seeking to obtain relevant [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":631,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[14,36],"class_list":["post-630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-security","tag-digital-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is eDiscovery and How Does It Work? | 3B Data Security<\/title>\n<meta name=\"description\" content=\"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is eDiscovery and How Does It Work? | 3B Data Security\" \/>\n<meta property=\"og:description\" content=\"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T16:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/\"},\"author\":{\"name\":\"Annabelle Ilsley\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"headline\":\"What Is eDiscovery and How Does It Work?\",\"datePublished\":\"2025-01-03T16:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/\"},\"wordCount\":1053,\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog-Featured-Image-34.png\",\"keywords\":[\"cyber security\",\"Digital Forensics\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/\",\"name\":\"What is eDiscovery and How Does It Work? | 3B Data Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog-Featured-Image-34.png\",\"datePublished\":\"2025-01-03T16:27:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog-Featured-Image-34.png\",\"contentUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog-Featured-Image-34.png\",\"width\":2000,\"height\":600,\"caption\":\"eDiscovery\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/what-is-ediscovery-and-how-does-it-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is eDiscovery and How Does It Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/author\\\/ag3bds\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is eDiscovery and How Does It Work? | 3B Data Security","description":"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/","og_locale":"en_GB","og_type":"article","og_title":"What is eDiscovery and How Does It Work? | 3B Data Security","og_description":"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2025-01-03T16:27:00+00:00","og_image":[{"width":2000,"height":600,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png","type":"image\/png"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#article","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/"},"author":{"name":"Annabelle Ilsley","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"headline":"What Is eDiscovery and How Does It Work?","datePublished":"2025-01-03T16:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/"},"wordCount":1053,"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png","keywords":["cyber security","Digital Forensics"],"articleSection":["Cyber Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/","name":"What is eDiscovery and How Does It Work? | 3B Data Security","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png","datePublished":"2025-01-03T16:27:00+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"Discover what eDiscovery is, how it works, and why it\u2019s essential for managing digital evidence in legal, investigative, and compliance processes. Learn about its benefits, from cost savings to improved regulatory compliance.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/11\/Blog-Featured-Image-34.png","width":2000,"height":600,"caption":"eDiscovery"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/what-is-ediscovery-and-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"What Is eDiscovery and How Does It Work?"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=630"}],"version-history":[{"count":1,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/630\/revisions"}],"predecessor-version":[{"id":632,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/630\/revisions\/632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/631"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}