Addressing the Abandoned Archive Risk
|
|
- Ross Strickland
- 8 years ago
- Views:
Transcription
1 Addressing the Abandoned Archive Risk WHITE PAPER
2 Table of Contents 3 Executive Summary 3 Introduction 4 What are Archives? 4 EOL, Obsolete, and Abandoned Archives 5 The Risks and Costs Associated with Abandoned Archives 6 What to do with an Obsolete or Abandoned Archive 7 The Migration Process 9 The ROI of Archive Migration 11 Best Practices Checklist for Archive Migration 11 Conclusion Table of Figures 4 Figure 1. The Basic Flow of an Archiving System 4 Figure 2. Abandoned or Obsolete Archive Systems Hide Archived Data 8 Figure 3. Bulk Migration from Archive to File Share 9 Figure 4. Filtering Data during Migration 2
3 Executive Summary Stand-alone, on-premise archiving solutions are quickly becoming outdated, either because the vendor no longer supports the archive or because there are much better solutions available. For those companies sitting on old archives, the question is what to do with their existing archive; do they spend the money to keep it running as they move to newer technologies, or do they shut it down and walk away from all of that archived data. Neither option makes much sense. Keeping an obsolete archive active to retain access to the archived information is both costly and risky. Shutting down and walking away from an obsolete archive carries with it additional legal liabilities. The right way to move beyond the obsolete archive is to migrate all data to another repository, or a staging area for further processing, then shut it down, and repurpose the hardware so that the original archived data is destroyed and not subject to discovery. archive migration is a specialized process and should only be done with trusted vendors and solutions. Keep reading for an in-depth discussion about best practices for archive migration. Introduction As corporate data has transitioned, from mostly paper-based to now, about 95% electronically created and consumed, the information management problem has changed as well. Prior to the shift towards electronically stored information (ESI), an information-heavy day for the average office worker would have translated to pieces of (real) mail, less than 10 work documents and a couple of extraneous pieces of marketing content. 90+% of hardcopy content wasn t considered a business record so only a couple hardcopy documents might have had to be filed for regulatory reasons. In today s business climate, individuals are buried in information all day long. Some market analysts have estimated that the average employee creates, receives, sends and shares hundreds of megabytes of content per day, a large majority of which is and attachments. This volume can equate to hundreds of pages of content per day. Increasingly comprehensive requirements for regulatory retention and litigation preparedness further complicate today s information. The increased scope of what constitutes regulatory information, and the amendments to the federal rules of civil procedure (FRCP), which in 2006 defined ESI as discoverable, pushed many companies to adopt archiving solutions to automatically capture the largest portion of this ESI deluge . 3
4 What are Archives? archiving solutions capture and sometimes other system content such as calendar entries, appointments, contacts, and tasks, directly from the system itself. The content is then stored in stand-alone archiving applications that index all content to make it searchable for later queries (Figure 1). More recent archives have additional capabilities such as basic records management, legal hold, and ediscovery tagging and export. When an is sent, it passes through the server where a copy is made and sent to the archive server where it is indexed and stored, with the index stored on a separate database server. The original is sent to the recipient s mailbox within the enterprise, or is sent outside the enterprise for routing to other domains. The same theory of operation holds true when the server receives . A copy is made and sent to the archive server (with the proper ownership information and metadata) where it is indexed and stored while the original is placed into the recipients mailbox. Tina s Mailbox Archive Server Server Database Server Bill s Mailbox Figure 1. The Basic Flow of an Archiving System EOL, Obsolete, and abandoned archives Archive Server Database Server There have been many occasions in the last several years where companies receive the dreaded EOL (endof-life) notification from their archiving vendor. Reasons include going out of business, new vendor directions, or being informed that another company purchased the vendor that was supporting your archive and they have decided to stop support. A related situation many find themselves in is sitting on an old archive that the customer chose to stop using several years ago and now find themselves being forced to access and retrieve old content due to a regulatory request or discovery order more about that later (Figure 2). Server Bill s Mailbox Figure 2. Abandoned or Obsolete Archive Systems Hide Archived Data 4
5 The Risks and Costs Associated with Abandoned Archives As was mentioned briefly in the previous section, there are two main reasons that trigger a need to migrate archived data from a discontinued, obsolete or abandoned archive: ediscovery and regulatory requirements. Legal Hold and ediscovery In December of 2006, the Federal Rules of Civil Procedure were amended to better account for the digital age. Rule 34 of the new amendments focused in on the discoverability of ESI: any designated documents or electronically stored information including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form. 1 Rule 34 started a rush by plaintiffs attorneys to begin asking for all sorts of electronic content that companies in the past had not had to deal with before. The amended FRCP also placed the burden of litigation (legal) holds on all potentially relevant electronic content, no matter where it was stored. A litigation hold is a provision in the FRCP requiring any party to an anticipated or existing lawsuit to preserve all data that may relate to a legal action involving the company. A litigation hold ensures that the documents (evidence) relating to the lawsuit are not destroyed and are available for the discovery process prior to actual court dates. The expectation of most Judges is that the discovered party must make a good faith effort to find and turnover all potentially relevant content that the opposing side has asked for in their discovery request. There are a couple caveats in reference to accessibility of data, but the overwhelming trend by Judges is if the data potentially exists, and has a possibility of pertaining to the case, the discovered party must secure and provide the data. Ignoring legal holds and ediscovery requirements, or not taking them seriously, can be extremely costly to an organization that is drawn into a lawsuit. Large fines, punitive judgments, loss of case, or even jail time can be the result of playing fast and loose with the ediscovery process. Regulatory Retention Requirements Compliance with Federal, State and local laws requiring the retention and availability of specific records are an accepted reality for most organizations. Companies in highly regulated industries such as financial services, energy, healthcare, and pharmaceutical manufacturers have highly prescriptive laws (regulations) pertaining to the types of records they must maintain and make available for inspection for specific periods. If an organization employs anyone, pays corporate taxes, or has investors, they have federal regulatory retention requirements. Much like the previously mentioned ediscovery requirements where the opposing counsel can ask for content relevant to a case, regulatory agencies can ask an organization for specific records that should have been retained. This information or records request is usually unscheduled and carries with it the expectation that the organization should be able to respond fully in a relatively short time. The inability to respond fully can trigger fines, penalties, and lawsuits by the regulatory agencies. Abandoned Archives are still a Liability Both ediscovery and regulatory requirements can place a costly burden on an organization if ESI exists in a repository not easily accessed. Many organizations with obsolete or abandoned archives may find they are forced to access, filter, and migrate their archived data quickly. Because regulatory and ediscovery requests are in essence obligatory, many organizations find themselves paying extremely high prices to get content out of their archive in the timeframe 1 FRCP Rule 34 Cornell Legal Information Institute This was ruled to include and associated data 5
6 provided by the Judge or Federal Agency. Those that forget about the existence of their archive, or for whatever reason cannot access it, have a high probability of incurring much higher costs in the form of fines, penalties, lost cases, and negative public relations. What to do with an Obsolete or Abandoned Archive If your organization has an aging, obsolete, or abandoned archive, proactively migrating the entire content store is a good business strategy for the legal and regulatory reasons stated above. The primary question to address when dealing with a migration project is what you plan on doing with the archived data. Additional questions include; do you plan to move the entire archive to another repository such as office 365 or into your current system?, are you responding to a discovery or regulatory request?, or do you want to proactively characterize the archived content so you can decide what to keep and what to defensibly dispose of during the migration process? Having answers to these questions before the migration begins will save time and cost in the end. Know your Situation The creation, use, and disposal of ESI can carry liabilities unknown ten years ago. Many organizations have run into conflicts with regulatory agencies and the courts for inadvertent actions. Many lawsuits have been lost before the trail began because someone unintentionally disposed of or lost ESI that they should have kept. With that said, it is never a good strategy to simply turn off and walk away from an archive. There may be data important to your business, subject to regulatory retention, or potentially relevant to a current or anticipated lawsuit. There are only two legally defensible processes available to shut down an archive: 1. Migrate the complete archive into another repository for continuing availability and management, or 2. Migrate the entire archive to a staging area, characterize the migrated content, filter the content to determine what to keep, and defensibly dispose of the rest. Shutting down an archive and repurposing the hardware without considering the liabilities of the archived content could be extremely risky. You could be faced with an order to reassemble and access the archived content, even if the content has been partially written over. If unable to retrieve the content, you could face a destruction of evidence judgment if it is later determined you should have anticipated the archived content could be relevant in a lawsuit (a low probability but not zero). Before any migration begins, you should ask your legal department to sign off on the migration project. Questions to ask your legal department to respond to in writing are: Does the organization have any regulatory retention requirements that, based on retention period and the age of the archived content, could be present in the archive? Does the organization have ediscovery or legal hold requirements for data potentially present in the archive based on the ediscovery timeframe for the lawsuit? Develop a Plan First Before a migration plan is completed, every department should be consulted to determine if they have records requirements that could be affected by the archive migration. The obvious planning participants include the legal department, the CFO, and the Chief Compliance Officer. Other not so obvious departments include human relations, investor relations, PR, information security, R&D, and records management. Most departments in an organization should have detailed knowledge about their specific information requirements. 6
7 A migration plan should address these specific questions: Why does the organization need to migrate the archive? What brand/type of archive does the organization have? Where will the migrated data go? Most vendors have rearchitected their products, and, consequently, their customers are faced with an opportunity to upgrade or migrate to a new solution. A significant number of organizations are opting to migrate to a cloud archive. Gartner 2013 Magic Quadrant for Enterprise Information Archiving 2 Are there any lawsuits or regulatory information requests that should be taken into consideration? Are there any regulatory retention requirements? Does chain of custody need to be maintained? Will the entire archive be migrated into another repository? Will there be any filtering or culling required? Will some of the data be disposed of? The above questions are not a comprehensive list but provide an idea of topics to consider. For example, if you are migrating an archive because you need to respond to an ediscovery or regulatory information request, you need to consider things like maintaining chain of custody, ensuring metadata is not altered during migration, and immediately securing migrated content under a legal hold until it can be fully screened for relevance. If your company has decided to migrate your archive because it has reached EOL, has been replaced with a new product by the vendor, or because you have simply decided to move to a different platform (and you do not have any legal or regulatory requirements surrounding the data) the migration would be a much more straightforward process. The Migration Process As stated earlier, there are two main migration strategies; migrate everything to another repository or, migrate the entire archive to a staging area, process/filter the content, and finish the migration. When simply migrating the archive in its entirety and depositing it into another repository (Figure 3), the main concerns to address are: 1. Who manufactured your archive? The answer to this question will also tell you the format the archived data is stored. 2. What types of data were archived: , and attachments, task lists, appointments, contacts, notes, completed tasks, accepted appointments, refused appointments, data movements, deleted items and all metadata? Many archive vendors simply grabbed and attachments from the journal mailbox so were not able to capture much metadata or other content types. The Mimosa NearPoint Archive, on the other hand, was able to archive a much more comprehensive data set. 3. Where will the migrated data be deposited: files shares, Microsoft Exchange, Office 365, or other? 4. Based on the end repository, what format does the migrated data need to be in? 2 7
8 As noted in question #1 above, a major consideration is the manufacturer of the archive. The key to a troublefree archive migration is to utilize a solution that can recognize and work with the archived data format and has experience doing so successfully. A more complex migration process includes extenuating circumstances surrounding the archive and reason for the migration - especially when ediscovery or regulatory inquiries are involved or you want to filter for specific content and dispose of the rest. The additional step of deduplication, culling, categorization and disposing of unneeded content will add to the cost of the migration but can save a great deal more than it will cost in storage savings, in ediscovery costs, and in productivity improvements. Archive Server Archive 2-Anywhere Migration Server File Share Archive SQL Server Archive 2-Anywhere SQL Server Figure 3. Bulk Migration from Archive to File Share Additional Migration Issues archive regulatory inquiries, legal hold requirements, and ediscovery response, require full knowledge of the migration application capabilities and careful handling of the migration while in process. When migrating an obsolete archive due to ediscovery response, the data should be moved to a staging location so the archive content can be searched for case relevant content. The actual movement of the data must be accomplished so that no content, including all metadata, attachments, hyperlinks etc., is altered. The data chain of custody should also be maintained so that any questions about data originality and alterations can be addressed later. In a discovery situation, you must be able to assure the court that all potentially relevant information was found, reviewed for relevancy, and secured under a legal hold. When dealing with these kinds of special circumstances, or if you plan to filter and cull the archived data before it is moved into another repository, a staging location and additional information management capability is needed so that additional processing can be completed before final migration. Figure 4 below shows the additional staging process. 8
9 Staging area for Dedup, Culling, Categorization, Defensible Disposal Cloud Storage Archive Server Archive 2-Anywhere Migration Server Legal Dept SharePoint Archive SQL Server Archive 2-Anywhere SQL Server File Share Figure 4. Filtering Data during Migration Shutting Down the Abandoned Archive - Defensibly The final step many companies neglect after they have migrated all content out of their obsolete archive is to repurpose the archive hardware so there is no possibility of recovering any data from the old archive based on an ediscovery request. If data is potentially retrievable, an attorney may be able to convince the Judge that data could exist on the abandoned archive system. Once the migration has been completed, reformat the archive storage and repurpose it to be used with other solutions so it can never be discovered in the future. The ROI of Archive Migration Return on investment or ROI is an often-misunderstood investment performance measure used to evaluate the quality (gain) of an investment. Many vendors broadly misuse ROI to mean dollar cost savings - but ROI is always expressed as a percentage. As you will see a little later in this section, cost savings is one of the variables needed to calculate ROI but the cost of the investment (solution) is also an important variable. So what is the return on investment (ROI) for proactively migrating from your old abandoned archive due to litigation issues? To calculate the cost savings for a migration investment, first you need to estimate what it would cost 9
10 to quickly respond to an ediscovery request by hiring experts and consultants to fire up the abandoned archive and search it for relevant information. Keep in mind that for regulatory requests and ediscovery orders, the information searched for and pulled out must not be altered during the process, including any metadata; otherwise, any deletions or alterations could be considered destruction of evidence. Generally speaking ediscovery experts can cost $200 to $400 per hour, per expert, for this type of rush service. In real world situations, the estimated cost to run this process successfully would be hundreds of thousands or even millions of dollars. The next step is to estimate the cost to respond to a discovery request after the migration has occurred taking into account the straightforward search and retrieval - probably one or two days work by a couple of IT people. Conservatively this cost could reach between $2,000 and $5,000 at the most. Therefore, in this example, the cost savings calculation would include the cost of the process before the investment minus the cost of the process after the investment. However, keep in mind a cost savings does not equal an ROI calculation. To finish the ROI calculation, the cost of the investment needs to be subtracted from the cost savings as well as divided into the cost savings. The ROI formula looks like this: ROI = (Cost of the process before the investment cost of the process after the investment) the cost of the investment Cost of the investment As an example, the cost of reacting to a regulatory or ediscovery request to retrieve specific data out of an abandoned archive and searched for relevance is approximately $250,000. We have already estimated the cost of searching the migrated content at $5,000. The cost savings would be $245,000 ($250,000 - $5,000). To calculate the ROI, you need to figure in the cost of the investment. For this example, the cost of the solution (investment) for the proactive migration of all data from the archive is estimated at $35,000. Using the ROI formula above, the calculation would look like this: ROI = ($250,000 $5,000) $35,000 $35,000 or 600% A 600% return on investment is a good return - few investments approach that type of gain. The key is to conservatively estimate real-life costs and cost savings. 10
11 Best Practices Checklist for Archive Migration Understand why you are migrating data from your obsolete archive Consult with all potentially affected departments Determine what vendor sold the archive and what types of data they were capable of archiving Understand what data your archive captured Document how far back the archive goes start date Verify any legal and regulatory requirements that could affect data in the archive, i.e. any outstanding regulatory or ediscovery requests in a given date range Determine the final repositories for the migrated data and any format requirements Create a migration plan and get legal to sign off Understand any bandwidth limitations and plan accordingly Work with a vendor experienced with your archive, with a documented record of success Alert any affected end-users to the new location of their data When deleting data, do it in a defensible manner document all policies followed Wipe and repurpose all archive hardware Document every step in the process followed conclusion archives have been around for many years and are now being eclipsed by new technologies and capabilities. This evolution has caused several archiving vendors to leave the business, stranding thousands of their customers with obsolete archives offering only expensive upgrades to remedy the situation. As a result, many customers have chosen to simply abandon their obsolete solutions leaving huge amounts of data behind. These huge data archives have become a growing liability due to regulatory and ediscovery requirements and as the abandoned archives age, the cost to recover data increases dramatically. It is never a good business strategy to abandon an archive. The only legally defensible thing to do with an abandoned archive is to migrate all the data to another repository for characterization, filtering, retention and defensible deletion to ensure required ediscovery and regulatory retention requirements are met. 11
12 About Archive360 Archive360 provides next generation software tools for archive migrations. As an Independent Software Vendor (ISV), Archive360 works directly with customers and a global network of specialist partners. Archive360 designs solutions to handle the most demanding archive migration projects in the world. Archive360 is committed to protecting your records for every business, regulatory and end-user requirement, with complete chain of custody reporting. Whether you're migrating your data to a new on-premise archive or into a cloud solution, Archive360 s products are engineered to cope with highly complex migrations and high volumes. For more information, please visit Archive360 Global Headquarters: 1737 S Naperville Road Suite 101 Wheaton, IL USA P: +1 (630) E: ARCHIVE360.COM Copyright 2014 Archive360, Inc. 12
The Case for Migrating Legacy Email Archives
The Case for Migrating Legacy Email Archives WHITE PAPER Table of Contents 3 Executive Summary 3 Key questions to address before you begin a migration project 4 Why migrate from a legacy email archive?
More informationMIGRATING YOUR EMC SOURCEONE EMAIL ARCHIVE
SOLUTION BRIEF MIGRATING YOUR EMC SOURCEONE EMAIL ARCHIVE Obsolete Email Archives Pose a Regulatory and Legal Risk As far back as the late 1990 s, organizations began to realize the need to incorporate
More informationTake Advantage of Newer, More Powerful and Flexible Solutions: Exchange 2010/2013, or Cloud Solutions such as Office 365
MIGRATING YOUR SYMANTEC ENTERPRISE VAULT EMAIL ARCHIVE Take Advantage of Newer, More Powerful and Flexible Solutions: Exchange 2010/2013, or Cloud Solutions such as Office 365 As far back as the late 1990
More informationFIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER
FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER Introduction Microsoft Office 365 is a new powerful office productivity solution that replaces multiple on premise
More informationReduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
More informationMeaning Based Computing: Managing the Avalanche of Unstructured Data
Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information
More informationThe evolution of data archiving
The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured
More informationThe Future of Information
Place image here The Future of Information Management Bill Tolson Iron Mountain In the face of an ongoing electronic information explosion, information management becomes an imperative. Organizations need
More informationDirector, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
More informationInformation Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
More informationThe Disconnect Between Legal and IT Teams
WHITEPAPER The Disconnect Between Legal and IT Teams The Duty to Preserve Why manual email archiving and user categorization doesn t cut it anymore #4 in a series of 4 whitepapers. Circulate this document
More informationWHITE PAPER SPON. Best Practices for Managing Archive Migrations. Published June 2014. An Osterman Research White Paper. sponsored by.
WHITE PAPER N Best Practices for Managing An Osterman Research White Paper Published June 2014 sponsored by sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
More informationLowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007
Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential
More informationediscovery: The New Information Management Battleground Developments in the Law and Best Practices
Sponsored by ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Kahn Consulting Inc. (847) 266-0722 info@kahnconsultinginc.com Introduction The following
More informationWHITE PAPER. Deficiencies in Traditional Information Management
WHITE PAPER Deficiencies in Traditional Information Management Table of Contents 3 Abstract 3 Information Management Defined 7 Problems with Traditional Approaches 8 Conclusion Table of Figures 5 Figure
More informationI N F O R M A T I O N I M M E D I A C Y, D I S C O V E R Y & C O N T I N U I T Y
White Paper By Bill Tolson Mimosa Systems, Inc. May 2007 Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with ediscovery Option Large Health Supplement Manufacturer
More informationProactive Data Management for ediscovery
Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition
More informationE-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?
E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery
More informationReal World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
More informationStrategies for Preparing for E-Discovery
Strategies for Preparing for E-Discovery The amendments to the U.S. Federal Rules of Civil Procedure regarding the discovery of electronically stored information make it imperative for organizations to
More informationBEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper
BEYOND THE HYPE: UNDERSTANDING THE REAL IMPLICATIONS OF THE AMENDED FRCP PA G E : 1 BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure A Clearwell Systems
More informationOnly 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful
Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has
More informationEmail Archiving: Common Myths and Misconceptions
White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504 www.messageone.com Introduction From the executive
More informationE-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
More information102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare
102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,
More informationDOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
More informationIMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION
IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION REUTERS / SUHAIB SALEM Written by Kyle Sparks White paper EXECUTIVE SUMMARY Data collection during ediscovery is critically important because
More informationand ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance
Electronic Record Retention and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Agenda What is all this ediscovery buzz? Email is major focus of ESI Impact of New FRCP rules
More informationCapstone for Records Management
Capstone for Records Management Patrick Bland, Esq. ediscovery & Information Governance Specialist DLT Solutions Capstone for Records Management 1 DLT Solutions Company Background Provider of best of breed
More informationWhite. Paper. How Archiving Reduces the Cost and Complexity of Reactive ediscovery. April 2010
White Paper How Archiving Reduces the Cost and Complexity of Reactive ediscovery By Brian Babineau April 2010 This ESG White Paper was commissioned by Symantec and is distributed under license from ESG.
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationThe E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
More informationA White Paper. Email Archiving Implementation. Five Costly Mistakes to Avoid. By Bob Spurzem. May 2008. Mimosa Systems, Inc.
A White Paper By Bob Spurzem Mimosa Systems, Inc. May 2008 Email Archiving Implementation Five Costly Mistakes to Avoid INFORMATION IMMEDIACY, DISCOVERY & CONTINUITY CONTENTS Introduction...3 1. Server
More informationARCHIVING FOR EXCHANGE 2013
White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver
More informationSimplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.
THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the
More informationUnderstanding How Service Providers Charge for ediscovery Services
ediscovery SERVICES Understanding How Service Providers Charge for ediscovery Services The objective of this document is to briefly define the prominent phases of the ediscovery lifecycle, the fees associated
More informationNavigating Information Governance and ediscovery
Navigating Information Governance and ediscovery Implementing Processes & Technology to Reduce Downstream ediscovery Cost and Risk Shannon Smith General Counsel, Globanet March 11 12, 2013 Agenda 1 Overview
More informationIn-House Solutions to the E-Discovery Conundrum
125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION
More informationE-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar
E-Discovery for Paralegals: Definition, Application and FRCP Changes April 27, 2007 IPE Seminar Initial Disclosures ESI Electronically Stored Information FRCP 26(a)(1)(B) all ESI must be disclosed initially
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationW H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011
W H I T E P A P E R Symantec Enterprise Vault and Exchange Server 2010 November 2011 Introduction... 3 Enterprise Vault Support and Compatibility for Exchange Server 2010... 3 So What Is New In Exchange
More informationDiscovery Technology Group
Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention
More informationThe Disconnect Between Legal and IT Teams
WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,
More informationEnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.
TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery
More informationOVERCOME REGULATORY DATA RETENTION CHALLENGES WITH COMPLIANCE ARCHIVING
OVERCOME REGULATORY DATA RETENTION CHALLENGES WITH COMPLIANCE ARCHIVING EXECUTIVE SUMMARY A modern enterprise must retain information for years in order to comply with ever-changing government and industry
More informationElectronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic
More informationXact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013
MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??
More informationA CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing
A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing Shannon Smith, Esq., ediscovery and Archiving Specialist for CommVault Systems Bennett B. Borden,
More informationPreparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of
THE WINDOWS MANAGER S GUIDE TO INSIDE: A Concerning the matter heretofore of the party of the first part in the aforementioned case notwithstanding, it can be argued that on a number of occasions over
More informationProduct Overview Archive2Anywhere Message Stub Management
Product Overview Archive2Anywhere Message Stub Management From Archive360 Introduction to Stubs and Shortcuts One of the many benefits that legacy archives provide is the ability to manage the size of
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationEmail Archiving/Retention Frequently Asked Questions (FAQ)
Email Archiving/Retention Frequently Asked Questions (FAQ) 1. Why do we use email archiving? The County s need to search email has risen dramatically over the last few years, driven by public disclosure
More informationsavvisdirect White Papers
savvisdirect White Papers Email Archiving, Compliance & ediscovery for Legal Professionals Services not available everywhere. CenturyLink may change or cancel services or substitute similar services at
More informationElectronic Discovery: Litigation Holds, Data Preservation and Production
Electronic Discovery: Litigation Holds, Data Preservation and Production April 27, 2010 Daniel Munsch, Assistant General Counsel John Lerchey, Coordinator for Incident Response 0 E-Discovery Rules Federal
More informationShould You Outsource Your Email?
Should You Outsource Your Email? By: Brien M. Posey According to a recent study by Symantec and Gartner (http://www.itworld.com /Webcasts /bytopic/3/index.html), most companies consider email to be a mission
More informationUsing EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce
More informationESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*
ESI DEMYSTIFIED Streamlining the E-Discovery Process Through Internal Processes and Controls Melinda Burrows Bruce Cosgrove* The widespread proliferation of electronically stored information (so-called
More informationSolution Brief. Archiving from Office 365 for Compliance and ediscovery. 1) Capture Everything
Solution Brief Archiving from Office 365 for Compliance and ediscovery Barracuda Message Archiver enhances Office 365 with the additional functionality needed to support sound information governance practices.
More informationA Modern Approach for Corporations Facing the Demands of Litigation
A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and
More informationArchiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
More informationEMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations
EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and
More informationEDMT Solution Helps Big Litigation Between OnlineNIC and Verizon, Microsoft and Yahoo
EDMT Solution Helps Big Litigation Between OnlineNIC and Verizon, Microsoft and Yahoo USE CASE STUDY WHAT I S STRUCTURED DATA, R ELEVAN CE AND MOR E Over the past 20 years, structured data created by business,
More information3 BENEFITS OF COMPLIANT EMAIL ARCHIVING.
3 BENEFITS OF COMPLIANT EMAIL ARCHIVING. Assure compliance, speed ediscovery, and help protect your intellectual property. BY NED FASULLO Ned Fasullo is a life-long technologist, and data-driven marketing
More informationE-Discovery Perils: The AutoArchive Function Not Gone, But Forgotten?
E-Discovery Perils: The AutoArchive Function Not Gone, But Forgotten? Thomas J. Smith This article examines the hidden perils, from an e-discovery and records management perspective, of the AutoArchive
More informationREDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - PRIORITIZATION FOR 100% REVIEW. Bill Tolson Sr. Product Marketing Manager Recommind Inc.
REDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - Bill Tolson Sr. Product Marketing Manager Recommind Inc. Introduction... 3 Traditional Linear Review... 3 Advanced Review Strategies: A Typical Predictive
More informationRecords Retention & E-Discovery. Preserving Electronically Stored Information for Litigation
Records Retention & E-Discovery Preserving Electronically Stored Information for Litigation Introduction Increasingly, data is created, sent, received, and stored electronically. In fact, 89 billion business
More information3 Reasons to Archive Email
3 Reasons to Archive Email Capacity & PSTs, Migration to Exchange 2010 & Compliance Executive Summary Last year, 725 million worldwide email accounts, each generated 110 messages a day*. Those numbers
More informationVeritas Enterprise Vault.cloud for Microsoft Office 365
TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of
More informationGUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION Experience increasingly demonstrates that discovery of electronically stored information ( ESI poses challenges
More informationPredictability in E-Discovery
Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski
More informationAre Mailboxes Enough?
Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day
More information10 Point Plan to Eliminate PST Files
10 Point Plan to Eliminate PST Files Executive Summary When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present more challenges
More informationThe ediscovery Balancing Act
WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................
More informationIntelligent Information Management: Archive & ediscovery
Intelligent Information Management: Archive & ediscovery Byron Chang Senior Systems Engineer / Symantec Hong Kong Agenda 1 Today s Information Management Challenges 2 Why Information Management? 3 The
More informationMaking Sense of E-Discovery: 10 Plain Steps for Producing ESI
Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in
More informationWhere the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited
November 17, 2010 Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited Wayne Wong, Managing ESI Consultant, Kroll Ontrack Tom McCaffrey, Director of Archiving,
More informationWhat Am I Looking At? Andy Kass
Concordance Tip Sheet August 2013 What Am I Looking At? Andy Kass Discovery is the process of requesting, producing and gleaning documents to substantiate assertions of fact in a case. Review is a deep,
More informationCA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
More informationToo bad the electronic file paradigm couldn t follow along with this thoughtful approach.
The Difference Between Paper and Electronic Files Toby Brown Paper is wonderful. It is comforting to the touch. It is portable. It is easy to read and browse. You can read through pages and back again.
More informationEmail Management and Litigation Risk Management
Email and Litigation Risk Email is one of the most heavily used applications in every enterprise. But it s also an application that, without proper management, can threaten an organization s future. Just
More informationE-Discovery in Practice: A Roadmap for Financial Institutions
E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida
More informationState of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers
More informationS O L U T I O N P R O F I L E. StoredIQ s Flagship ediscovery for SharePoint
StoredIQ s Flagship ediscovery for SharePoint February 2011 Many ediscovery companies announced integration with Microsoft SharePoint last year. Frankly, our usual response was a resounding yawn. These
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationELECTRONIC DISCOVERY & LITIGATION SUPPORT
ELECTRONIC DISCOVERY & LITIGATION SUPPORT A Primer by MessageSolution, Inc. The recent influx of federal and industry email regulations combined with the increased use of electronic discovery in court
More informationThe Intrusive Nature of Discovery in U.S. Patent Litigation
The Intrusive Nature of Discovery in U.S. Patent Litigation October 16, 2014 Jeffrey R. Schaefer jschaefer@ulmer.com All patent infringement litigation in the U.S. takes place in federal courts. Cases
More informationIntegrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
More informationRule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover
: Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to
More informationTodd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group
Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information
More informationTERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
More informationZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide
More informationMeasures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
More informationIntroduction Thanks Survey of attendees Questions at the end
Introduction Thanks Survey of attendees Questions at the end 1 Electronic records come in a variety of shapes and sizes and are stored in a multitude of ways. Just what are you managing? Video Cloud computing
More informationChapter 1. Getting to Know Email Archiving Systems
Chapter 1 Email Archiving Basics In This Chapter Understanding basic email archiving systems Choosing between on-premise, hosted, and hybrid solutions Understanding the storage benefits of email archiving
More information# Is ediscovery eating a hole in your companies wallet?
1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing
More informationHow to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation
How to Avoid The Biggest Electronic Evidence Mistakes Ken Jones Senior Technology Architect Pileum Corporation Why is Proper Handling of Electronic Data Important? Most of the evidence in your case isn
More informationEmail Management Trends, Troubles, and Solutions
Email Management Trends, Troubles, and Solutions Kevin O Connor General Manager, Content Management & Archiving 1 Information Challenges Lead to Archiving Data Growth Digital Proliferation Cost Escalating
More informationHow To Manage An Electronic Discovery Project
Optim The Rise of E-Discovery Presenter: Betsy J. Walker, MBA WW Product Marketing Manager What is E-Discovery? E-Discovery (also called Discovery) refers to any process in which electronic data is sought,
More informationHow To Write A Hit Report On A Lawsuit Against A Company
Everything You Wanted to Know About ESI and E-Discovery but Were Afraid to Ask Jason M. Pistacchio Presented By: Gregory S. Johnson Attorney Attorney/Legal Technologist Cosgrave Vergeer Kester LLP Paine
More informationPreservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
More information