Cloud Email Collector

Automatically collect complete email threads from Gmail, Outlook, and IMAP accounts.

Overview

Hearsay's Cloud Email Connector provides an agentless method for preserving and collecting mailbox data from major inbox providers. By leveraging modern OAuth 2.0 authentication protocols, legal teams can establish a secure connection to Google Workspace (Gmail) or Microsoft 365 (Outlook/Exchange) or other IMAP email systems without ever requiring or storing custodian passwords. Our targeted extraction engine allows you to perform surgical collections—filtering by date range, keywords, or specific folders—directly at the source. This significantly reduces the volume of irrelevant data and increases the completeness of the records collected, while maintaining a complete chain of custody.

Hearsay's Cloud Email Connector provides a forensically sound, agentless method for preserving and collecting mailbox data from major inbox providers. Our targeted extraction engine allows you to perform surgical collections—filtering by date range, keywords, or specific folders—directly at the source.

Hearsay's Cloud Email Connector provides a forensically sound, agentless method for preserving and collecting mailbox data from major inbox providers. Our targeted extraction engine allows you to perform surgical collections—filtering by date range, keywords, or specific folders—directly at the source. This significantly reduces the volume of irrelevant data, lowering downstream hosting costs while maintaining a complete immutable chain of custody.

Strategic Benefits

Can be Completed Without Needing to Share Passwords

Get Copies of Emails Without Cascading Indentation

Easier than using Google Takeout, etc.

Key Capabilities

One-click OAuth connection

Keyword, Folder, Date Culling

Collects and Preserves Attachments

Keep Connections Active with Live View

How It Works - Request to Review in 10 minutes or less

  1. Initiate Request

Send an extraction code to your client via email.

  1. Client Logs in to Email

Client follows link and signs into their email account.

  1. Automatically Share Emails (~5 minutes)

Client searches for and shares all matching emails and threaded conversations.

  1. Review Data

Using our online platform, you can read, annotate and review the data shared from the client.

  1. Download Messages as an Exhibit

Export defensible PDFs, RSMF load files, or other formats instantly.

Technical Specs

Supported Services

Gmail, Outlook,

Yahoo!, IMAP

No Computer Needed

Data Collected

Email & Attachments

Export

Formats

PDF, Excel, RSMF

Expected Time

10 minutes

Collection Process Details

Learn how the whole process work

Need emails from an inbox?

Open a new matter today.

You can be reviewing within the hour.

Start New Collection

Book a Demo

See Pricing ->

Technical Specs

Supported Services

Gmail, Outlook,

Yahoo!, IMAP

Data Collected

Email & Attachments

Export

Formats

PDF, RSMF

Expected Time

10 minutes

Collection Process Details

Learn how the whole process work

Key Capabilities

One process for both iOS & Android

Programmable search for better control

Targeted collections protect privacy

Laptop Rentals Available ->

How It Works - Request to Review in 1 hour

  1. Initiate Request

Create a case and extraction code to automatically send instructions to your client via email.

  1. Connect Device

Client installs our FREE application to their computer.

  1. Run Extraction Process (~1 hour)

Client plugs in their phone to the computer to start the extraction.

  1. Client Select Data or You Pre-Define Search Terms.

Choose specific conversation threads to preserve and review in your account.

  1. Review Data

Using our free online platform, you can read, annotate and review the data shared from the client.

  1. Download Messages as an Exhibit

Create a defensible PDF export and/or RSMF load file instantly.

Frequently Asked Questions

Does this extract deleted messages?

It can recover messages that have not yet been overwritten by the OS, but we cannot guarantee recovery of all

deleted data. Often we are only able to find gap artifacts.

Do you need the passcode?

Yes, the device must be unlocked to establish the trust relationship with the computer. We are not hacking or jailbreaking any devices to collect data.

What apps do you extract data from?

iMessage, SMS, MMS, WhatsApp, Call Logs, Voicemail, Notes & Safari History, Photos, and more soon.

HELP GUIDES

How to Prepare for a Collection

How to Prepare for a Collection

How to Prepare for a Collection

How to Prepare for a Collection

How to Prepare for a Collection

Key Capabilities

One-click OAuth connection

Keyword, Folder, Date Culling

Collects and Preserves Attachments

Keep Connections Active with Live View

How It Works - Request to Review in 10 minutes or less

  1. Initiate Request

Send an extraction code to your client via email.

  1. Client Logs in to Email

Client follows link and signs into their email account from their phone or computer.

  1. Automatically Share Emails (~5 minutes)

Client searches for and shares all matching emails and threaded conversations.

  1. Review Data

Using our online platform, you can read, annotate and review the data shared from the client.

  1. Download Messages as an Exhibit

Export defensible PDFs, RSMF load files, or other formats instantly.