SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION
|
|
|
- Alaina Paul
- 10 years ago
- Views:
Transcription
1 Below are SAMPLE interrogatories and requests for production that are meant to be complementary (i.e., any devices or electronic files that are identified in answer to an interrogatory or interrogatories are usually immediately requested in the follow-up request[s] for production). Sample Interrogatories and Requests for Production [Note: The precise format for the following suggested interrogatories and requests for production of documents and things should be in accordance with the applicable civil and local rules of the court where the matter is filed.] [suggested language for inclusion in preamble:] I. Definitions For the purposes of the following interrogatories and requests for production of documents and things, the following definitions apply: Application Software: A set of electronic instructions, also known as a program, which instructs a computer to perform a specific set of processes. Archive: A copy of data on a computer drive, or on a portion of a drive, maintained for historical reference. Backup: A copy of active data, intended for use in restoration of data. Computer: Includes but is not limited to network servers, desktops, laptops, notebook computers, employees home computers, mainframes, the PDAs of [party name] and its employees (personal digital assistants, such as PalmPilot, Cassiopeia, HP Jornada and other such handheld computing devices), digital cell phones and pagers. Data: Any and all information stored on media that may be accessed by a computer. Digital Camera: A camera that stores still or moving pictures in a digital format (TIFF, GIF, etc.). Document: Includes but is not limited to any electronically stored data on magnetic or optical storage media as an active file or files (readily readable by one or more computer applications or forensics software); any deleted but recoverable electronic files on said media; any electronic file fragments (files that have been deleted and partially overwritten with new data); and slack (data fragments stored randomly from random access memory on a hard drive during the normal operation of a computer [RAM slack] or residual data left on the hard drive after new data has overwritten some but not all of previously stored data). Hard Drive: The primary hardware that a computer uses to store information, typically magnetized media on rotating disks. Help Features/Documentation: Instructions that assist a user on how to set up and use a product including but not limited to software, manuals and instruction files. Imaged Copy: A mirror image bit-by-bit copy of a hard drive (i.e., a complete replication of the physical drive). Input Device: Any object that allows a user to communicate with a computer by entering information or issuing commands (e.g., keyboard, mouse or joystick). Magnetic or Optical Storage Media: Include but are not limited to hard drives (also known as hard disks ), backup tapes, CD-ROMs, DVD-ROMs, JAZ and Zip drives, and floppy disks. Network: A group of connected computers that allow people to share information and equipment (e.g., local area network [LAN], wide area network [WAN], metropolitan area network [MAN], storage area network [SAN], peer-to-peer network, client-server network). Page 1 of 8
2 Operating System: Software that directs the overall activity of a computer (e.g., MS-DOS, Windows, Linux). Network Operating System: Software that directs the overall activity of networked computers. Software: Any set of instructions stored on computer-readable media that tells a computer what to do. Includes operating systems and applications. Storage Devices: Any device that a computer uses to store information. Storage Media: Storage media are any removable devices that store data. II. Spoliation: getting information on preservation of information. S1. Written policies on preservation of records Do you have a written policy for the retention of documents, including but not limited to business records? Request for Production No. : Please produce copies of any and all written policies for the retention of documents, for the time period of to inclusive. S2. Destruction of documents Do you have a written policy for the destruction of documents, including but not limited to business records? Request for Production No. : Please produce copies of any and all written policies for the destruction of documents, for the time period of to inclusive. Interrogatory No. : Has destruction or overwriting of documents been suspended? If so, on what date did suspension begin? S3. Persons in charge of maintaining document retention and destruction policies Identified by job title, job description and business address and telephone number, who are all persons in charge of implementing the policies identified in your answer to Interrogatories 1 and 2 above? Interrogatory No. : If not the same person(s) as identified in your answer to the immediately preceding interrogatory, identify by job title, job description, and business address and telephone number, the person at [party name] who is the most knowledgeable about the retention and destruction of documents at [party name]? With respect to preventing the spoliation of documents and things that may potentially become evidence in litigation, please identify with particularity and in detail: a. Whether the minutes of the meetings of the Board of Directors, from [date] to [date] contain any references to considerations or discussions of preventing such s poliation of potential evidence. b. If so, state the dates of the meetings for which minutes were taken. Page 2 of 8
3 c. If so, state the name, title, job description, business address and telephone number of the person or persons with custody of those minutes. Request for Production No. : Please produce all documents referenced in the immediately preceding interrogatory. S4. Preservation of evidence Since [date of opposing party s awareness of client s claim or counterclaim, if not date of complaint, crossclaim or counterclaim], have any documents at [party name] been destroyed? If so, please state which electronic files have been deleted from the magnetic or optical storage media of [party name] or overwritten from that date to the present, and dates of destruction or overwriting. S5. Storage of documents As to the storage of data generated by the users of your computers (such as word-processed files and e- mail), please state whether: A. The data are backed up on tape or other media? 1. If so: a. How many such media currently exist with backup data on them? b. What is the maximum storage size in megabytes for each such media? c. What is the brand name for each such media? d. When was the last time each such media was backed up with data? e. What was the computer or other hardware (e.g., individual workstation, server) for each such backup? f. With respect to the immediately foregoing question, state the physical location and current user of each computer or other hardware listed. Request for Production No. : Please produce all backup and/or archive media, for the time period of to inclusive. III. Data Universe identifying it Does or did [party name] maintain, or contract with another party to maintain, an overall inventory of data resources such as a Year 2000 Plan or Disaster Recovery Plan? If so, please provide the name, address, phone number and other contact information for the individuals primarily responsible for maintenance of the inventory and/or plan. Produce any and all company organizational and policy information in its entirety, including but not limited to organizational charts, corporate policy and procedure manuals, policy memoranda, system schematic, network topology, system restart procedures, retention policies, Year 2000 Plan, Disaster Recovery Plan, and other related items. IV. Information personnel Page 3 of 8
4 Provide a list of all personnel responsible for maintaining computer hardware, data or information systems on computers for [party name]. Include name, position title, contact information, and official job description and list of duties. Produce all formal and informal contact lists and duty rosters for personnel in Information Technology (IT) and Information Services (IS), or equivalent divisions within [party name]. Specifically include rosters for groups such as Incident Response Teams, Data Recovery Units, Audit/Investigation Teams, etc. Produce all formal job descriptions, assignments and personnel lists for IT and IS personnel, including revisions, for the period to. V. Loose media (including Backup and Archive) Does [party name] maintain a policy regarding use of loose or removable media in its workstations, computers or networks? If so, state the name of the person(s) responsible for creating and enforcing that policy. Provide a copy of the policy mentioned in the preceding interrogatory, as well as any revisions, records or logs related to formulation or enforcement of that policy for the period to. Produce any and all devices used to place information on loose or removable storage media, including but not limited to hard drives, floppy drives, CD-ROM drives, tape drives, recordable DVD-ROM drives, and removable drives (e.g., Jaz, Syjet, Zip, SuperDisk). Include all instructions for use and maintenance of those devices. Produce any and all loose or removable media used to store data, including but not limited to floppy disks, CD-ROM discs and tape drive cartridges, that have been used by personnel or contractors of [party name] to perform work for [party name]. Produce any and all backup and/or archived data [describe scope of data]. All slack, wherever located, even if media contains nonproduced data. VI. Computer hardware List all computer equipment provided by [party name] or used by employees of [party name] to perform work for [party name], including but not limited to hardware and/or peripherals attached to a computer such as computer cases [desktop, tower, portable/batteries, all-in-one], monitors, modems [internal, external], printers, keyboards, printers, scanners, mice [cord and cordless], pointing devices [joystick, touchpad, trackball] and speakers. Include description of equipment, serial number, all users for the period to and dates used, and all locations where the equipment was located for the period to. Page 4 of 8
5 Will [party name] permit, without an order therefore, inspection of the equipment mentioned in the preceding interrogatory? Request No. [follow-up, if response to preceding interrogatory is negative] : Please produce the following computers, including their magnetic or optical storage media, for inspection and copying, on or before [date], at the offices of [law firm] at [address]: [list of computers you want image-copied, previously identified in discovery; alternatively, if you know the computer population is relatively small]: Please produce your computers, including their magnetic or optical storage media, for inspection and copying, on or before [date], at the offices of [law firm] at [address]: List all hardware components (e.g., motherboard, modem, NIC, etc.) installed internally or externally to the PC(s) used by during the period to. Provide any and all documentation of software and hardware modifications to the PC(s) used by during the period to, including but not limited to modification dates, software/hardware titles and version numbers, names of persons performing modifications, location of any backup of the data on the computer performed prior to modification, and disposition of replaced software and hardware. Produce any and all documentation instructing in setup and use of the PC(s) used by during the period to, and hardware and software installed on that/those PC(s). Include any and all documentation reflecting communication with a computer professional or help desk for help in setting up and using the PC(s). List discarded or replaced hardware and software for the PC(s) (including entire PCs) used by during the period to. If the hardware or software is no longer in your control, then include the name and contact information of last known custodian. VII. Computer Software Produce any and all software installed or used on the PC(s) used by during the period to. Include all titles and version numbers. Include authors and contact information for authors of custom or customized software. Include operating system(s) software. VIII. Operating Systems List all operating systems (including but not limited to UNIX, Windows, DOS, Linux and PDA operating systems) installed on all computers used by [party name], the specific equipment the OS was installed on and the period during which it was installed on the specific equipment. Provide copies of all operating system software listed in the preceding interrogatory, and all supporting documentation provided with the software, and any manuals and tutorials acquired by [party name] to support use of the software. IX. Telephony Page 5 of 8
6 Do you have any graphic representation of the components of your telephone and voice messaging system, and the relationship of those components to each other, including but not limited to flow charts, videos or photos, and diagrams? If so, where are the documents located? Include logical paths for electronic documents. Produce copies of any and all graphic representations of your telephone and voice messaging network, and the relationship of those components to each other, including any revisions, for the period of to inclusive. If the documents are electronic, please produce them in their native form, as they existed at the time they were drafted, based on archive or back-up data. List all telephone equipment provided by [party name] or used by employees of [party name] to perform work for [party name], including but not limited to desktop telephones, cell phones, pagers, PDA and laptop modems, calling cards, telephony software and contact management software. Include description of equipment and software, serial number, all users for the period of to inclusive and dates used, and all locations where the equipment was located for the period of to inclusive. Will [party name] permit, without an order therefore, inspection of the equipment mentioned in the preceding interrogatory? Produce any and all voice messaging records including but not limited to caller message recordings, digital voice recordings, interactive voice response unit (IVR/VRV) recordings, unified messaging files, and computer-based voice mail files to or from [specified parties] for the period to. Produce all phone use records for [party name] including but not limited to logs of incoming and outgoing calls, invoices and contact management records, manually or automatically created or generated for the period from to inclusive. X. Other sources of electronic evidence List all log files (files with suffixes) found on computers in [party name] s network, and the equipment and logical path where the log files may be found. Provide copies of the following log files: [this is a follow-up request to the preceding interrogatory, issued after the list of log files has been reviewed] Produce any and all manual and automatic records of equipment use, including but not limited to fax, access, audit, security, , printing, error and transmission records. Page 6 of 8
7 Do any employees of [party name] subscribe to or participate in Internet newsgroups or chat groups in the course of their employment? If so, list all users and the services that they subscribe to or participate in. Produce any and all information related to newsgroups or chat groups, including but not limited to names and passwords for each and every service, newsgroup messages, text files and programs used to access messages. Do any employees of [party name] use portable devices in the course of their employment that are not connected to [party name] s network, and that are not backed up or archived? If so, list all users and the devices they use. Produce any and all portable devices not backed up or archived, including but not limited to handheld devices, set-top boxes, notebook devices, CE devices, digital recorders, digital cameras and external storage devices. Does [party name] provide Internet access for any of its employees or has [party name] done so at any time during the period from to inclusive? If so, list the employees who had Internet access, the Internet service provider (ISP) used, and describe the method(s) used to connect to the Internet. Produce any and all documentation describing installation and use of hardware and software used by [party name] to provide Internet access for its employees during the period from to inclusive. Produce copies of all manuals, policies and other guidelines for employee access and use of Internet resources. Describe any restrictions on, controls over or monitoring of employee use of Internet resources. Provide any records generated as a result of restrictions on, controls over and monitoring of employee use of Internet resources. Provide a list of any and all Internet-related data on the PCs used by [specific employees or classes of employees], including but not limited to saved Web pages, lists of Web sites, URL addresses, Web browser software and settings, bookmarks, favorites, history lists, caches, cookies. XI. Data security measures List any and all user identification numbers and passwords necessary to access computers or programs addressed in interrogatories and requests. Your response to this interrogatory must be updated with responses to future sets of interrogatories and requests and updated responses to any set of interrogatories and requests. Page 7 of 8
8 Please provide copies of your computer security policies and procedures and the name and contact information for the person responsible for security. Please provide information about the security settings for the [program]. For example, please provide the security settings for the Exchange Server, noting who has administrative rights. XII. Network questions Produce any and all documents and things related to networks or groups of connected computers that allow people to share information and equipment, including but not limited to local area networks (LANs), wide area networks (WANs), metropolitan area networks (MANs), storage area networks (SANs), peer-to-peer networks, client-server networks, integrated services digital networks and VPNs. Produce any and all components related to networks, including but not limited to information exchange components (e.g., Ethernet, token-ring, ATM), network work file servers, traffic, hubs, network interface cards, cables, firewalls, user names, passwords and intranet. N1. System overview Do you have any graphic representation of the components of your computer network, and the relationship of those components to each other, including but not limited to flow charts, videos or photos, and drawings? Include network topology documents and network schemas in your response. If so, where are the documents located? Include logical paths and physical locations for electronic representations. Produce copies of any and all graphic representations of your computer network, and the relationship of those components to each other, including any revisions, for the period of to inclusive. If the documents are electronic, produce them in their native form, as they existed at the time they were drafted, based on version or backup data. XIII. Electronic mail ( ) Produce any and all information related to , including but not limited to current, backed-up and archived programs, accounts, unified messaging, server-based , Web-based , dial-up , user names and addresses, domain names and addresses, messages, attachments, manual and automated mailing lists and mailing list addresses. Page 8 of 8
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
How To Answer A Question About Your Organization'S History Of Esi
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
1 PERSONAL COMPUTERS
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
lesson 1 An Overview of the Computer System
essential concepts lesson 1 An Overview of the Computer System This lesson includes the following sections: The Computer System Defined Hardware: The Nuts and Bolts of the Machine Software: Bringing the
BACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy
Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the
Electronic documents questionnaire
Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes
Module 1 Concepts of Infor mation Technology (IT) Module Goals
Module 1 Concepts of Infor mation Technology (IT) The following is the Syllabus for Module 1, Concepts of Information Technology (IT), which provides the basis for the theory-based test in this module
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
Network Documentation Checklist
Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation
Rule 30(b)(6) Deposition Question Topics
Rule 30(b)(6) Deposition Question Topics Electronic Data Systems & Management Technical Witness The parameters of a Rule 30(b)(6) deposition may vary greatly from case to case, but the following categories
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From:
Republic of the Philippines Department of Finance INSURANCE COMMISSION 1071 United Nations Avenue Manila BIDS AND AWARDS COMMITTEE SUPPLEMENTAL BID BULLETIN NO. 2 SUPPLY, DELIVERY, INSTALLATION AND COMMISSIONING
2. Empty the Recycle Bin. Some users need to be reminded to periodically empty the Recycle Bin.
The ultimate preventive maintenance checklist What's the support pro of 1999 and beyond to do for preventive maintenance on user machines? Here's a checklist of 29 things you can do to keep your users
PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS
PROCEDURE 4040P Community Relations PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS Electronic Discovery Committee To help meet its obligations, the WSD uses an Electronic Discovery Committee, made up
Contents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)
BTEC First Diploma for IT Scheme of Work for Computer Systems unit 3 (10 credit unit) Overview On completion of this unit a learner should: 1 Know the of 4 Be able to. Num of hours Teaching topic Delivery
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Chapter 1. Computers and You. Computers Are Your Future. Computers & You. Understanding the Computer: Basic Definitions
Computers Are Your Future Chapter 1 Computers and You What You Will Learn... Define the word computer and name the four basic operations Describe the main components of a computer Hardware Software Provide
102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare
102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,
Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation
Technology Assessment Checklist for Small Businesses A quick way to help your small-business customers get the best technology. Today's small-business owners want reliable technology that helps them do
Musical instrument digital interface (MIDI) interfaces or adapters
Bidder's List Criterium Selection Page Select Description Communications, Computer Equipment, Peripherals, Components and Supplies Communications and computer supplies Audio recording media Blank audio
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
IT Solutions Resource Management Consulting Group 1101 15 th Street NW Suite 206 * Washington DC 20005 * Office (202) 962-3980
IT Solutions Resource Management Consulting Group 1101 15 th Street NW Suite 206 * Washington DC 20005 * Office (202) 962-3980 Category Description Discount Offered from PCN's List Price Mobile Printers
E-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar
E-Discovery for Paralegals: Definition, Application and FRCP Changes April 27, 2007 IPE Seminar Initial Disclosures ESI Electronically Stored Information FRCP 26(a)(1)(B) all ESI must be disclosed initially
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]
What follows isn t the perfect preservation letter for your case, so don t simply treat it as a form. Use it as a drafting aid that flags issues unique to EDD, but tailor your preservation demand to the
Electronic Data Retention and Preservation Policy 1
1 Purpose and Scope The purpose of this policy is to: Identify the types of College-related electronic information, including the location of the information; Identify what departments or individuals are
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION Experience increasingly demonstrates that discovery of electronically stored information ( ESI poses challenges
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
E-Business Technologies
E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications
VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE
VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE HIPAA CHECKLIST FOR INFORMATION TECHNOLOGY AND COMPUTER SYSTEMS SECURITY AREA OF CONCERN QUESTIONS Workstations Software/Hardware
How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.
How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq. IMPORTANT NOTICE This publication is not a do-it-yourself guide to resolving employment disputes or handling
Understanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
EXHIBIT 7:1 Sample Preservation Letter [LAW FIRM] [date/address] Re: Notice to Preserve Electronic Evidence [Legal Matter] Dear :
EXHIBIT 7:1 Sample Preservation Letter [LAW FIRM] [date/address] Re: Notice to Preserve Electronic Evidence [Legal Matter] Dear : Our law firm represents [name] in the above legal matter in which you [your
REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS
REED COLLEGE ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS TABLE OF CONTENTS A. INTRODUCTION... 1 B. THE LANDSCAPE OF ELECTRONIC RECORDS SYSTEMS... 1 1. Email Infrastructure...
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization
Module 1 Introduction to Information and Communication Technologies
Module 1 Introduction to Information and Communication Technologies Lesson 3 What are the Hardware Components of a Computer? UNESCO EIPICT Module 1. Lesson 3 1 Rationale The hardware components are the
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
Directory computing, or folder, a file
A1 Terminology-Ilir Term Definition Image Digital literacy Directory Digital literacy is the knowledge, skills, and behaviors used in a broad range of digital devices such as smartphones, tablets, laptops
Chapter 8 Operating Systems and Utility Programs
Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage
ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT
ATTACHMENT 1 CURRENT NJ SVRS ENVIRONMENT OVERVIEW The New Jersey Statewide Voter Registration System (SVRS) was purchased from Covansys, Inc in 2005 based on their ElectioNet application. While the core
Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
MANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
VVC Technology & Information Resources Catalog of Services
1. Information Technology a. Accounts i. Account Management (1) Credential Management (a) Your IT Department manages system credentials on all systems excepting Financial 2000, SnowWhite, Charming and
E-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
New Mexico Broadband Program. Basic Computer Skills. Module 1 Types of Personal Computers Computer Hardware and Software
New Mexico Broadband Program Basic Computer Skills Module 1 Types of Personal Computers Computer Hardware and Software Basic Computer Skills Learning Objectives Acquire introductory familiarity with basic
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Computer Security Policy (Interim)
Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
SMALL BUSINESS OUTSOURCING
SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement
Chap-02, Hardware and Software. Hardware Model
Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit
Client Server Computing
Client Server Computing Architecture, Applications and Distribution System Devendra Kumar GLOBAL VISION PUBLISHING HOUSE 20, Ansari Road, Daryaganj, New Delhi-110002 (INDIA) Contents Acknowledgement (vii)
i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
Axis Technologies Computer Hardware and Electronics Portfolio Categories
Axis Technologies Computer Hardware and Electronics Portfolio Categories SEPTEMBER 2008 Barebone Accessories Barebone Systems Media Center Barebone Systems Mini / Booksize Barebone Systems Bluetooth Headsets
Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology.
Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*
ESI DEMYSTIFIED Streamlining the E-Discovery Process Through Internal Processes and Controls Melinda Burrows Bruce Cosgrove* The widespread proliferation of electronically stored information (so-called
Mid-Term #1 Solutions
Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the element into the modern economy. A. labor B. information C. capital D. land 2. Pie charts are an example
CHAPTER 3: HARDWARE BASICS: PERIPHERALS
CHAPTER 3: HARDWARE BASICS: PERIPHERALS Multiple Choice: 1. is the early operating system developed by Microsoft A. Monitor B. MS-DOS C. Mouse D. Video games Answer: B Reference: Bill Gates Rides the Digital
CLASS SPECIFICATION Systems Support Analyst II
San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )
Edward C. Rickstang (SBN RICHMOND & FIELDS LLP S. Rawlston Avenue Suite 0 Altford, CA 01 Tel: ( 0- Fax: ( 0- Attorneys for Plaintiff HEALTHBILL SYSTEMS, LLC UNITED STATES DISTRICT COURT CENTRAL DISTRICT
Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others
WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE A Guide for University Faculty, Staff, and Others What is a Litigation Hold Notice? Notice from an authorized UW department (Attorney General s Office,
INFORMATION SYSTEMS. Written examination. Friday 12 November 2004
Victorian Certificate of Education 2004 SUPERVISOR TO ATTACH PROCESSING LABEL HERE INFORMATION SYSTEMS Written examination Friday 12 November 2004 Reading time: 11.45 am to 12.00 noon (15 minutes) Writing
Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
CSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
Chapter 4. System Software. What You Will Learn... Computers Are Your Future. System Software. What You Will Learn... Starting the Computer
What You Will Learn... Computers Are Your Future Chapter 4 The two major components of operating system software Why a computer isn t useful without an operating system The five basic functions of an operating
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
