Source categories

Evidence Types

Boston-based, serving clients nationwide by appointment.

Common source categories addressed in preservation engagements, with intake details that help define scope, handling method, transfer planning, and the record package expected at close-out.

Mobile devices

Phones and tablets may contain messages, media, application data, synchronized account content, and location-linked records that can change quickly with ordinary use.

Common examples

  • iPhone and Android devices
  • iPad and other tablets
  • Device backups and associated account exports

Common preservation risks

  • Replacement, reset, upgrade, trade-in, or return to a carrier or employer
  • Changes to passcodes, accounts, or synchronization settings
  • Ongoing use that may alter message or application data

What to mention at intake

  • Device model, condition, and whether it is still in active use
  • Whether backups or linked cloud accounts exist
  • Any time-sensitive turnover, travel, trade-in, or access issue

Computers and external media

Laptops, desktops, and removable media may contain user files, exports, browser data, logs, archives, and system records relevant to preservation scope.

Common examples

  • Windows and Mac laptops or desktops
  • External drives, USB media, and memory cards
  • Server-side shares or transferred archives where access is authorized

Common preservation risks

  • Reassignment, reimaging, or return of equipment
  • Hardware instability or storage-media failure
  • Ad hoc copying that breaks handling context

What to mention at intake

  • Device type, operating system, and storage condition if known
  • Whether the source can travel or must remain on site
  • Whether there are related external drives, backups, or shared folders

Email and cloud repositories

Mailboxes and cloud repositories often require provider-specific export paths, admin coordination, and clear custodian or timeframe instructions before a defensible export can occur.

Common examples

  • Microsoft 365, Exchange, and Google Workspace mailboxes
  • OneDrive, SharePoint, Google Drive, and Dropbox repositories
  • Administrative exports or downloaded account archives

Common preservation risks

  • Mailbox turnover, deprovisioning, or account closure
  • Shared-drive restructuring or permission changes
  • Incomplete exports caused by vague date, custodian, or folder instructions

What to mention at intake

  • Provider, custodian, and whether admin access exists
  • Date ranges, folders, accounts, or repositories that define the scope
  • Whether the output should remain in native export format or be delivered another way

Messaging and collaboration platforms

Messages and collaboration data can be preserved when an authorized export or transfer path exists and scope is clearly defined before chats, memberships, or retention settings change.

Common examples

  • Text messages and messaging-app data
  • Slack, Teams, or other collaboration exports where authorized
  • Downloaded chat histories, shared attachments, and related exports

Common preservation risks

  • Message deletion, ephemeral retention, or account membership changes
  • Incomplete exports that omit attachments, reactions, or channel context
  • Screenshot-only handoffs that lose handling and metadata context

What to mention at intake

  • Which platform is involved and who controls access
  • Whether exports, screenshots, or account-level access are available
  • Whether attachments, shared files, or channel membership context matter

Logs, backups, and account records

Account-level records may help preserve access history, administrative activity, backup context, or transfer history when they fall within the confirmed matter plan and a structured export path exists.

Common examples

  • Administrative logs and access-history exports
  • Backup sets, restore references, and account archives
  • Provider-generated account or transfer records

Common preservation risks

  • Short log-retention windows
  • Provider-side changes that alter what can still be exported later
  • Failure to tie logs or backups to the corresponding source inventory

What to mention at intake

  • Which provider or system holds the records
  • Whether logs relate to a specific device, custodian, or account event
  • Any short retention period or admin dependency affecting timing

Transferred media, screenshots, and third-party exports

Sometimes the matter begins with material already copied or exported by another person or system. Those materials may still be relevant, but the receipt record should distinguish them from direct-source preservation.

Common examples

  • Portal downloads and vendor-produced exports
  • Transferred screenshots, PDFs, and image sets
  • Media or archives received from another stakeholder

Common preservation risks

  • Unclear origin or incomplete transfer history
  • Mixing third-party exports with direct-source material without labeling the distinction
  • Assuming screenshots alone preserve all relevant context

What to mention at intake

  • Who created or exported the materials originally
  • Whether the original source is still available for direct preservation
  • What transfer, receipt, or inventory record exists for the materials already received

What affects method selection

  • The source type and current condition
  • Whether the source must remain in active use
  • What authority and access path are available
  • Whether preservation, transfer-ready delivery, or both are required

What the initial email should include

  • Source type, custodian, and current location or control
  • Any reset, return, deprovisioning, trade-in, or retention deadline
  • Whether backups, linked accounts, or prior exports already exist
  • Who will approve scope and where the final records should go

For handling posture and governance details, see Privacy & Data Handling and Security & Compliance.