Click Here for a Prezi Presentation of Where Edata is to be Found
You might overlook sources of ESI. Mobile workers' laptops, out-of-use applications or zip drives, or undisclosed backups created by project managers with a deep mistrust of hard drive reliability are all possibilities. Your opponent can request any or all of these data stores. You can also request data in these stores. So when putting together your discovery requests keep all these sources in mind.