Remediating Data The Right Way


After the dust settles on a matter, what needs to happen to the data?

The goal of remediating data is to make the data reasonably inaccessible to the user without extraordinary means. Accomplishing this requires an understanding of what data is valuable, its location, and how it should be retained or deleted.

This new webinar walks through the variables associated with remediating data in trade secrets, corporate litigation, and intellectual property matters and includes:


  • Understanding options for data remediation
  • Standard deletions vs. secure delations on a computer
  • The burden of proof of protecting trade secrets
  • Outward data dissemination – Figuring out how far the data got
  • Settlement agreements and affidavits/certifications
  • Remediation protocol
  • Best practices to determine and reach your data remediation goals

Who Should Watch?

While this webinar will cover elements that are beneficial for most members of the legal industry, the topics covered will specifically be beneficial for the following group of professionals:

  • Attorneys practicing Trade Secret, Corporate Litigation, and IP (Intellectual Property) law
  • Paralegals
  • Corporate General Counsel
  • Human Resource Executives

Presentation Deck

Download a PDF of the entire presentation deck.


Chad Gough walks through the ins and outs of remediating data the right way to ensure that the cat gets back in the bag.

chad gough headshot

Chad Gough

Owner & Founder / 4Discovery

Chad is the owner and founder of 4Discovery. He brings over two decades of experience in all aspects of digital forensics, electronic discovery, and information security matters. Chad heads up most forensic projects and provides expert testimony and consulting for attorneys. He routinely presents on a multitude of ESI data topics at various professional organizations for attorneys, litigation support professionals, corporate general counsels, forensic examiners, and information security professionals. Chad currently teaches courses on computer forensics and incident response at DePaul University, focusing on internet vulnerabilities, criminal activity, and investigative procedures.