The document outlines sound collection practices for electronically stored information (ESI), emphasizing the need to determine what to collect and the differences between readily accessible and 'not reasonably accessible' data. It discusses the complexities of authenticating ESI, including challenges posed by alterations, digital forensics, and the importance of maintaining a proper chain of custody. Best practices for data collection, including thorough vendor selection and systematic methodologies, are highlighted to ensure data integrity and admissibility in legal contexts.