{"id":8179,"date":"2025-06-25T07:56:11","date_gmt":"2025-06-25T13:56:11","guid":{"rendered":"https:\/\/idsinc.com\/?p=8179"},"modified":"2026-03-09T14:48:04","modified_gmt":"2026-03-09T20:48:04","slug":"hidden-electronic-evidence","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/hidden-electronic-evidence\/","title":{"rendered":"Hidden Sources of eDISCOVERY"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p>When most people hear the term eDiscovery, their minds immediately jump to the usual suspects: computers, smartphones, tablets. It\u2019s natural. These are the tools we interact with every day, and they store emails, messages, documents, and other digital footprints relevant to investigations. However, the reality is more complex. Electronic evidence can live beyond these expected sources. It can be hidden in places you might never imagine, like the office photocopier or other memory-enabled devices that don\u2019t look like traditional data storage at all.<\/p>\n\n\n\n<p>Several years ago, I attended a critical case meeting with my attorney and a team of investigators. They had seized computers and smartphones and presented their findings confidently. When it was my turn to ask questions, I inquired whether the business had copying machines or other devices capable of electronic access. The reaction was immediate and unmistakable\u2013 a deer-in-headlights moment. It was clear that many overlook these hidden sources, even in thorough investigations. That moment underscored an important truth: when it comes to eDiscovery, the obvious isn\u2019t always enough.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-expanding-the-definition-of-electronic-evidence\"><strong>Expanding the Definition of Electronic Evidence<\/strong><\/h3>\n\n\n\n<p>Critical evidence often hides in unexpected places, embedded in everyday devices you might not consider. These less obvious sources can hold valuable data that could significantly impact the outcome of a case. As technology evolves, so do the locations where digital information resides. Limiting your search to traditional gadgets risks missing vital pieces of the puzzle and leaving gaps in your investigation.<\/p>\n\n\n\n<p>To uncover the full story, you need to know where else to look. Let\u2019s dive into some surprising devices that could be holding the answers you need.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-virtual-reality-goggles\" style=\"padding-left:25px\"><strong><em>Virtual Reality Goggles<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Not just for games. These headsets like the Oculus series do more than provide immersive experiences. They store everything from internet searches to personal data, tracking the user\u2019s digital journey.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-copy-machines\" style=\"padding-left:25px\"><strong><em>Copy Machines<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">More than paper pushers. These devices store records of every copy, scan, and print job, sometimes even saving and releasing documents for later use.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-activity-trackers\" style=\"padding-left:25px\"><strong><em>Activity Trackers<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">These wristbands track heart rates, locations, and daily routines. Devices like Fitbit collect detailed personal information along with GPS data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-smart-tvs\" style=\"padding-left:25px\"><strong><em>Smart TVs<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Today\u2019s televisions do more than stream shows. They store viewing history, search activity, and user preferences\u2014revealing digital patterns that often go unnoticed. Internet-connected models can hold surprising amounts of personal data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-ring-doorbells\" style=\"padding-left:25px\"><strong><em>Ring doorbells<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">These increasingly common devices do more than monitor the front door. They record video footage, timestamp arrivals and departures, and log who comes and goes, often capturing details crucial to investigations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-automobiles\" style=\"padding-left:25px\"><strong><em>Automobiles<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Vehicles today are mobile data hubs. Many come equipped with GPS, WiFi, and onboard systems that track location, usage patterns, and driver behavior, making them a valuable source of electronic evidence.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-smart-watches\" style=\"padding-left:25px\"><strong><em>Smart watches<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">What was once just a timekeeper is now a personal data vault. Devices from Apple, Android, and others store health metrics, messages, app activity, and location data. The wrist has become a surprisingly rich source of digital evidence.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cpap-machines\" style=\"padding-left:25px\"><strong><em>CPAP machines<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Designed to treat sleep apnea, these medical devices often include modems and SD cards that collect and transmit sensitive health data. What appears to be a simple sleep aid may hold critical electronic evidence.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cameras\" style=\"padding-left:25px\"><strong><em>Cameras<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Every photo tells more than a visual story. Many modern cameras embed GPS coordinates and connect to WiFi, transforming images into trackable digital records complete with time, date, and location data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-game-systems\" style=\"padding-left:25px\"><strong><em>Game systems<\/em><\/strong><\/h4>\n\n\n\n<p style=\"padding-left:25px\">Behind the games is a detailed digital footprint. Consoles like Xbox and PlayStation store user profiles, chat logs, gameplay history, and network activity offering a surprising window into personal habits and digital behavior.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-you-can-t-interpret-what-you-don-t-know-exists\"><strong>You Can\u2019t Interpret What You Don\u2019t Know Exists<\/strong><\/h3>\n\n\n\n<p>Evidence rarely hides in plain sight. It\u2019s scattered across smart devices, embedded apps, structured systems, dormant logs, and overlooked platforms. While it used to live in one place\u2013 email, a phone, a laptop\u2013 that\u2019s no longer the case.<\/p>\n\n\n\n<p>Today, data is fragmented. Context is layered, and understanding what matters means tracing communication across multiple sources, not stopping at the first hit.<\/p>\n\n\n\n<p>At iDS, we don\u2019t just collect. We connect. Our consultative experts surface patterns that span platforms and timelines, bringing context to complexity and clarity to the case.<\/p>\n\n\n\n<p>With iDS, you don\u2019t just find what\u2019s hidden. You find what matters.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability. To learn more, visit <a href=\"https:\/\/idsinc.com\/en_gb\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a>.<\/strong><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>When most people hear the term eDiscovery, their minds immediately jump to the usual suspects: computers, smartphones, tablets. It\u2019s natural. These are the tools we interact with every day, and they store emails, messages, documents, and other digital footprints relevant to investigations. However, the reality is more complex. Electronic evidence can live beyond these expected [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":8178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,33,32],"tags":[],"class_list":["post-8179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-data-sources","category-ediscovery","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hidden Sources of eDISCOVERY - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/hidden-electronic-evidence\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden Sources of eDISCOVERY\" \/>\n<meta property=\"og:description\" content=\"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/hidden-electronic-evidence\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T13:56:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T20:48:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milton Hooper\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milton Hooper\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/\"},\"author\":{\"name\":\"Milton Hooper\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/64ce0b23e7e4258a2163bfaa86ad8502\"},\"headline\":\"Hidden Sources of eDISCOVERY\",\"datePublished\":\"2025-06-25T13:56:11+00:00\",\"dateModified\":\"2026-03-09T20:48:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/\"},\"wordCount\":773,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg\",\"articleSection\":[\"Blog\",\"Data Sources (Mobile, IoT, Non-Traditional)\",\"eDiscovery + Legal Tech\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/\",\"name\":\"Hidden Sources of eDISCOVERY - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg\",\"datePublished\":\"2025-06-25T13:56:11+00:00\",\"dateModified\":\"2026-03-09T20:48:04+00:00\",\"description\":\"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/hidden-electronic-evidence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hidden Sources of eDISCOVERY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/64ce0b23e7e4258a2163bfaa86ad8502\",\"name\":\"Milton Hooper\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g\",\"caption\":\"Milton Hooper\"},\"sameAs\":[\"https:\\\/\\\/idsinc.com%20\"],\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/milton-hooper\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hidden Sources of eDISCOVERY - iDiscovery Solutions","description":"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/hidden-electronic-evidence\/","og_locale":"en_GB","og_type":"article","og_title":"Hidden Sources of eDISCOVERY","og_description":"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.","og_url":"https:\/\/idsinc.com\/en_gb\/hidden-electronic-evidence\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2025-06-25T13:56:11+00:00","article_modified_time":"2026-03-09T20:48:04+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg","type":"image\/jpeg"}],"author":"Milton Hooper","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Milton Hooper","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/"},"author":{"name":"Milton Hooper","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/64ce0b23e7e4258a2163bfaa86ad8502"},"headline":"Hidden Sources of eDISCOVERY","datePublished":"2025-06-25T13:56:11+00:00","dateModified":"2026-03-09T20:48:04+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/"},"wordCount":773,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg","articleSection":["Blog","Data Sources (Mobile, IoT, Non-Traditional)","eDiscovery + Legal Tech"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/hidden-electronic-evidence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/","url":"https:\/\/idsinc.com\/hidden-electronic-evidence\/","name":"Hidden Sources of eDISCOVERY - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg","datePublished":"2025-06-25T13:56:11+00:00","dateModified":"2026-03-09T20:48:04+00:00","description":"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies.","breadcrumb":{"@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/hidden-electronic-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/06\/Hidden-Sources-of-eDiscovery-scaled-e1750858850940.jpg","width":1200,"height":600,"caption":"Uncovering hidden electronic evidence from non-traditional data sources and IoT devices to can strengthen eDiscovery strategies."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/hidden-electronic-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Hidden Sources of eDISCOVERY"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/64ce0b23e7e4258a2163bfaa86ad8502","name":"Milton Hooper","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54a71b187654265632e8188e9ac0172c047af50f2833554ea2ddb479ce4f9387?s=96&d=mm&r=g","caption":"Milton Hooper"},"sameAs":["https:\/\/idsinc.com%20"],"url":"https:\/\/idsinc.com\/en_gb\/author\/milton-hooper\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/8179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=8179"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/8179\/revisions"}],"predecessor-version":[{"id":8188,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/8179\/revisions\/8188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/8178"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=8179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=8179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=8179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}