{"id":1156,"date":"2024-09-25T10:08:14","date_gmt":"2024-09-25T14:08:14","guid":{"rendered":"https:\/\/web.uri.edu\/draft-its\/?p=1156"},"modified":"2024-12-12T09:05:33","modified_gmt":"2024-12-12T14:05:33","slug":"ediscovery-and-forensic-analysis","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/draft-its\/ediscovery-and-forensic-analysis\/","title":{"rendered":"eDiscovery and Forensic Analysis"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">eDiscovery and Forensic Analysis<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis.jpg\" alt=\"\" class=\"wp-image-54460\" style=\"width:250px;height:250px\" srcset=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis.jpg 1000w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis-300x300.jpg 300w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis-150x150.jpg 150w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis-768x768.jpg 768w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis-364x364.jpg 364w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/eDiscovery-and-Forensic-Analysis-500x500.jpg 500w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<p>Conducting an investigation of electronic data such as email, instant messages, internet history, word processing files, spreadsheets, social networking content that is stored on desktops, laptops, file servers, mainframes, smart phones, and employees\u2019 home computers or on a variety of other platforms.<\/p>\n\n\n\n<p>Customers will receive a forensic report pertinent to the investigation request. A customer can request additional information on a case-by-case basis. <\/p>\n\n\n\n<p><strong><strong>More information can be found at <a href=\"https:\/\/security.uri.edu\/\">security.uri.edu<\/a> or if you require consultation please contact the ITS Service Desk.<\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><section class=\"cl-wrapper cl-boxout-wrapper\"><div class=\"cl-boxout  \">\n\n<h3 class=\"wp-block-heading has-text-align-center\">Executive Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Technical Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<br>mkhalfayan@uri.edu<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Support Team<\/h3>\n\n\n\n<p class=\"has-text-align-center\">ITS Security<\/p>\n\n<\/div><\/section><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Analyze electronic data with detailed forensic reports.<\/p>\n","protected":false},"author":5142,"featured_media":54512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[24],"tags":[7,8,63,113,19,6,10],"class_list":["post-1156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services","tag-faculty","tag-sec","tag-security-privacy","tag-security-incident-response","tag-services","tag-staff","tag-students"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/comments?post=1156"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1156\/revisions"}],"predecessor-version":[{"id":54477,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1156\/revisions\/54477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media\/54512"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media?parent=1156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/categories?post=1156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/tags?post=1156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}