Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of

Size: px
Start display at page:

Download "Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of"

Transcription

1 THE WINDOWS MANAGER S GUIDE TO INSIDE: A Concerning the matter heretofore of the party of the first part in the aforementioned case notwithstanding, it can be argued that on a number of occasions over a period of time it should be noted that the provision of law so states that the plaintiff indicated he was guilty, so the defense rests ghh Kerberos, trusted third party, malware, phishing, access control, patch, information security, token, PGP, risk assessment, SSL, message authentication, PIN, firewall, passwords, external audit, NIST, key management, exploit, vulnerability, rootkits, worm. CHAPTER 2 Building bridges between IT shops, legal teams and security staff Preparation and collaboration are key for successful e-discovery.

2 CHAPTER 2 Building bridges between IT shops, legal teams and security staff A ONE OF THE toughest parts about creating an e-discovery strategy for the enterprise is that technology alone can t solve every problem. For IT executives, this means more than simply installing new search tools and -archiving software for Exchange Server or putting processes in place that help to do whatever it takes to create a SQL Server database that can be searched quickly if there is litigation. Before information was electronically stored, most paper records lived in corporate purchasing departments. Over time, they would typically move to an off-site storage facility. Today, data can be anywhere, plus the management of stored information is strategic to the corporation. There must be a staff member on hand with a skill set in both legal issues and IT. This is much easier said than done. It s hard enough for an IT executive to decipher legal jargon. Few have probably heard of a 30 (b) (6) witness, which is the person who testifies on behalf of a company in a deposition. IT executives also cannot sound like Merlin the wizard when giving technical recommendations to their legal counterparts. John Bace, a research vice president at Gartner Inc., the Stamford, Conn.-based consulting firm, recommends that before a problem darkens your corporate doorstep, make sure to set up a cross-departmental group, or steering committee. Members should not only include IT and legal but also, in some cases, security staff, depending on how the company is structured. Especially in the case of the large decentralized enterprise, there also needs to be a? WHAT IS... q Litigation hold: A litigation hold is when a company suspends its document retention or destruction policies for documents that may be relevant to a lawsuit that has been filed or that might be filed in the near future. q Information datamap: An electronically stored information data map is a written overview of electronic information for use by legal counsel when preparing for discovery in a court proceeding. 2 THE WINDOWS MANAGER S GUIDE TO

3 CHAPTER 2 A lawyer who is familiar with the enterprise IT architecture and topography. This is especially true following the Federal Rules of Civil Procedure that were revised at the end of Lawyers will be held to a higher professional standard in their understanding of IT policies, Bace said. You can t say, I don t know how IT works. That won t cut it. At Cox Enterprises Inc., the sprawling Atlanta-based media company has built a forensics unit that oversees e-discovery investigations. When Cox had to address an e- discovery request, staff from legal, IT and security which is external New rules specify role of electronic data in court to IT formed a litigation discovery team to resolve issues. The team picked one individual to be the e-discovery coordinator. This particular team and individual do all the collection, filtering and culling of files in most of the Cox business divisions, said Scott Steiner, privacy and information risk manager at Cox. Most other business units have minimal e-discovery requests, he added. Steiner said his team is usually brought in by general counsel, along with an IT advocate, who defines and assesses the project and then interviews everyone in litigation and in IT. The Federal Rules of Civil Procedure are regulations that spell out the procedures for civil legal suits within U.S. federal courts. The rules were established in 1938 and are frequently revised. The latest major revision was in 2006, when provisions were made for the handling of electronic records to accommodate electronic discovery. Under the new rules, parties are now required to address the issue of electronically stored data as well as any claims of privileged electronic information early in the proceedings in mandatory meet and confer sessions. The 2006 revisions acknowledge that electronically stored information is a fact of doing business and can be a trove of potentially useful data in a lawsuit. They also acknowledge that in a digital age where vast amounts of information are stored, litigants cannot be expected to produce anything anybody asks for. But because the new rules also leave open to debate what exactly constitutes reasonably and unreasonably accessible data, a company s electronic information system policies will be subject to legal scrutiny like never before. SEARCHCIO.COM 3 THE WINDOWS MANAGER S GUIDE TO

4 CHAPTER 2 A AND WHY OF A Employees need to know what the corporate litigation hold process is. Companies need to determine how a litigation hold will be issued, how to keep people from destroying documents and when to lock down records. Also, relevant backup tapes need to be taken out of rotation. After the litigation hold is issued, IT executives should then try to narrow its scope and determine how to start the data collection process, Steiner said. If you have a data map, this is the time to use it, he said. A main concern for Cox was related to the risk of data spoliation which refers to the preservation of data that can be used for discovery within an enterprise and establishing a chain of custody for that data. Pulling together a discovery request is expensive in terms of time and resources. IT executives should first determine if the request is feasible and if or how it can be mitigated. It is possible to negotiate. For example, if there is a request for all , that request might be too costly to produce. The team may counter-propose something that is reasonable and practical. Many times they accept the terms, Steiner said. The worst case is when IT offers information that is later ruled incomplete because what is produced was not the entire available data set, he said. L I T I G AT I O N D I S C O V E R Y R E S P O N S E P R O C E S S First internal awareness Issue internal litigation hold Discovery request by one party Court order issued Deliver response to the court Result review Archive database Search query User directory Discovery request Discovery depends on effective archiving Recent revisions require that litigants address electronic data issues early in the process. SOURCE: CONTOURAL INC. 4 THE WINDOWS MANAGER S GUIDE TO

5 The legal investigation is connected to the discovery request is connected to combing through terabytes of archived is connected to your clean bill of health is connected to Symantec Enterprise Vault, the comprehensive archiving solution that makes managing fast, efficient, and thorough Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Enterprise Vault are registered trademarks of Symantec Corporation. Take control of your most important digital assets. Up to 5% of your company s intellectual property is in or instant messaging. Today, a typical ediscovery request can cost IT departments countless hours and dollars to recover the specific range of messages on time. Symantec Enterprise Vault facilitates the legal and business best practices of storing, managing, and discovering and other electronic files. So you re free to focus on the big picture. Learn more at symantec.com/enterprisevault Confidence in a connected world.

6 CHAPTER 2 A QUICK LIST OF Gartner s Bace recommends that, for their part, IT executives should develop an inventory of electronic information that could potentially be requested during a discovery process. Executives should know what is reasonably accessible and what is not. This is not just creating an electronically stored information (ESI) data map. You want to try to help the lawyer limit the scope of discovery from the other side, he said. Let the legal team limit the scope of discovery to the relevant custodians who are involved in the matter. For example, if it s a case involving product liability, e-discovery might be limited to those who helped develop the product. The other side will ask for any and all [ , instant messages and so on], and you don t want to do IT executives should develop an inventory of electronic information that could potentially be requested during a discovery process. that, he said. Bace also suggests that IT executives and lawyers create a nomenclature and define their terms so every- Data retention policies Gartner Inc. offers its recommendations on retention policies q Develop a reasonable Windows document retention policy that supports the business and gives authority to destroy information when it is no longer needed. q Communicate, educate and enforce document retention policies to ensure they provide value and reduce risk for the organization. q Use technology to automate whenever and wherever possible regarding document retention and management. q Strive for a collaborative environment with regard to e-discovery. Whenever possible, negotiate with adversaries to share the value and reduce cost. 6 THE WINDOWS MANAGER S GUIDE TO

7 CHAPTER 2 A? WHAT IS... a litigation support manager? one is in agreement. Also, work with the legal staff to create some metrics that illustrate terms such as volume and speed. It may be too much of a cost burden to collect all for January, for example. Perhaps something can be worked out that is more reasonable. The process for e-discovery has to be repeatable, defensible and transparent, Bace said. Get the facts on the table, get to the court room, and there everyone can beat themselves bloody. The costs and volumes that are associated with e-discovery are rising, and enterprises must recognize that there is huge value in organizing their information and data, Bace said. By taking a proactive approach to preparing for an e-discovery request, and by creating cross-departmental teams and a plan for document management, IT executives are in a good position to minimize their companies overall risk in litigation. NO MATTER HOW much extra training is involved, IT managers are not lawyers and lawyers are not IT managers. Both have separate and complicated jobs. But this combination of skills, plus a changing legal landscape, has created the need for a role in the IT department for someone with insight on the needs of both, according to Gartner Inc., which is tracking this emerging career path. The role of the litigation support manager is to oversee the creation and maintenance of the inventories, to keep track of e-discovery products and services, to act as the liaison for corporate counsel in e-discovery actions, and to carry out the process of litigation hold, among other things. Gartner experts say many of these specialists now work in law firms. Indeed, the role is more likely filled by a lawyer than an IT support professional because fewer IT pros are likely to know the law. Over time, however, that is likely to change as IT departments become more familiar with the demands of the law, according to the firm. The only training that anyone is likely to have today is on the job. Enterprises might cull early candidates from IT security, where some pros will know forensics tools, or maybe even regulatory agencies or from law enforcement. Margie Semilof THE WINDOWS MANAGER S GUIDE TO

8 CHAPTER 2 ABOUT THE AUTHORS: A Margie Semilof is the senior news director for TechTarget s Windows Media Group and is responsible for news coverage of the Windows platform. A high-tech journalist for more than 20 years, Semilof has written about a variety of technical topics ranging from hardware and software to telecom and networking. Kathryn Hilton has worked as an industry analyst for Gartner Group and for several large storage companies. She is currently a senior analyst for policy at Contoural Inc., a provider of business and technology consulting services that focuses on litigation readiness, compliance, information and records management, and data storage strategy. The Windows Manager's Guide to e-discovery is part of the Windows Manager Guide series from SearchWinIT.com. Marilyn Cohodas Editorial Director Christine Casatelli Editor Martha Moore Copy Editor Linda Koury Art Director of Digital Content Jonathan Brown Publisher Gabrielle DeRussy Senior Director of Sales 8 THE WINDOWS MANAGER S GUIDE TO

9 RESOURCES FROM OUR SPONSOR Learn more about Symantec Enterprise Vault Symantec Enterprise Vault 200 provides a software-based intelligent archiving platform that stores, manages and enables discovery of corporate data from systems, file server environments, instant messaging platforms and content management and collaboration systems. q Click here for a variety of white papers, case studies, testimonials and more. 9 THE WINDOWS MANAGER S GUIDE TO

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools. THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the

More information

Windows shops that ignore electronic discovery requirements could be setting themselves up for some big costs.

Windows shops that ignore electronic discovery requirements could be setting themselves up for some big costs. THE WINDOWS MANAGER S GUIDE TO E-DISCOVERY INSIDE: CHAPTER 1 What is e-discovery and why should IT shops care? Windows shops that ignore electronic discovery requirements could be setting themselves up

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Email archiving: Planning, policies and. product. selection. chapter 1 email -archiving project roadmap

Email archiving: Planning, policies and. product. selection. chapter 1 email -archiving project roadmap INSIDE chapter 1 email -archiving project roadmap Email archiving: Ready to dive into email archiving? Try this four-phased approach to get your project up and running Planning, policies and product selection

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

email-archiving Defining an policy Planning, policies and product selection CHAPTER 2 email archiving

email-archiving Defining an policy Planning, policies and product selection CHAPTER 2 email archiving INSIDE email archiving Planning, policies and product selection Defining an CHAPTER 2 email-archiving 03 What is the purpose of an email-archiving policy? 04 What qualifies as acceptable use? Implement

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in

More information

E-Discovery Management in the Age of Big Data

E-Discovery Management in the Age of Big Data E-Discovery Management in the Age of Big Data Effective e-discovery can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big

More information

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Planning, policies and product selection

Planning, policies and product selection SearchExchange.com email archiving Planning, policies and product selection CHAPTER 5 Finding the right email-archiving product INSIDE 04 email-archiving products and services 05 of email-archiving products

More information

WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING. Best Practices for Defining and Establishing Effective Archive Retention Policies

WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING. Best Practices for Defining and Establishing Effective Archive Retention Policies WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING Confidence in a connected world. Best Practices for Defining and Establishing Effective Archive Retention Policies Sponsored by Symantec

More information

storage management and user productivity with email archiving

storage management and user productivity with email archiving SearchExchange.com email archiving Planning policies and product selection Improving CHAPTER 4 storage management and user productivity with email archiving INSIDE 04 What is the goal of email archiving?

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

Understanding the Benefits of Email Archiving. Volume 1 CMIT Solutions Webinar Series January 2010

Understanding the Benefits of Email Archiving. Volume 1 CMIT Solutions Webinar Series January 2010 Understanding the Benefits of Email Archiving Volume 1 CMIT Solutions Webinar Series January 2010 Welcome Melanie Fricke VP of Product Strategy CMIT Solutions Scott Barlow VP of Sales & Product Management

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER Elements of a Good Document Retention Policy Discovery Services WHITE PAPER Document retention especially the retention of electronic data has become a hot topic in the legal industry. In the wake of several

More information

Email Archiving: Common Myths and Misconceptions

Email Archiving: Common Myths and Misconceptions White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504 www.messageone.com Introduction From the executive

More information

Electronic Discovery How can I be prepared? September 2010

Electronic Discovery How can I be prepared? September 2010 Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic

More information

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013 MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??

More information

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Electronic Record Retention and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Agenda What is all this ediscovery buzz? Email is major focus of ESI Impact of New FRCP rules

More information

Digital Forensics Services

Digital Forensics Services Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together

More information

From Chaos to Clarity.

From Chaos to Clarity. LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners

More information

ediscovery and Information Governance Practice Overview

ediscovery and Information Governance Practice Overview ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence. This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

Optim. The Rise of E-Discovery. Presenter: Betsy J. Walker, MBA WW Product Marketing Manager. 2008 IBM Corporation

Optim. The Rise of E-Discovery. Presenter: Betsy J. Walker, MBA WW Product Marketing Manager. 2008 IBM Corporation Optim The Rise of E-Discovery Presenter: Betsy J. Walker, MBA WW Product Marketing Manager What is E-Discovery? E-Discovery (also called Discovery) refers to any process in which electronic data is sought,

More information

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing

A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing Shannon Smith, Esq., ediscovery and Archiving Specialist for CommVault Systems Bennett B. Borden,

More information

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened

More information

The E-Discovery Maturity Model

The E-Discovery Maturity Model The E-Discovery Maturity Model ADAM HURWITZ, CISSP September 2010 Tel. (888) 338-4242 www.biaprotect.com E-Discovery has evolved and grown over the last ten years to become a necessary part of doing business.

More information

Symantec Enterprise Vault Discovery.cloud

Symantec Enterprise Vault Discovery.cloud Fact Sheet: Archiving and ediscovery Symantec Enterprise Vault.cloud is a cloud-based archiving service that helps organizations store, manage, and discover business-critical information. The service is

More information

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

In-House Solutions to the E-Discovery Conundrum

In-House Solutions to the E-Discovery Conundrum 125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION

More information

A Modern Approach for Corporations Facing the Demands of Litigation

A Modern Approach for Corporations Facing the Demands of Litigation A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and

More information

E-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising

E-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising E-Discovery and Data Management Managing Litigation in the Digital Age Attorney Advertising Every day, 12 billion corporate e-mails are created. That number doubles annually. Litigation success starts

More information

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com Future Law Office: Best Practices for Taming e-discovery ediscovery SERVICES maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

Best Practices for Enforcing Legal Holds on E-Mail and Electronic Data through Proactive Archiving Sponsored by Symantec

Best Practices for Enforcing Legal Holds on E-Mail and Electronic Data through Proactive Archiving Sponsored by Symantec WHITE PAPER: Best Practices for legal holds Confidence in a connected world. Best Practices for Enforcing Legal Holds on E-Mail and Electronic Data through Proactive Archiving Sponsored by Symantec Jennifer

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and

More information

Sean Byrne Head of ediscovery Solutions Michael Lappin Director of Archiving Technology

Sean Byrne Head of ediscovery Solutions Michael Lappin Director of Archiving Technology Sean Byrne Head of ediscovery Solutions Michael Lappin Director of Archiving Technology ediscovery for Legacy Archives Today s Panel Michael Lappin Director of Archiving Technology Nuix Therese Craparo

More information

A Radicati Group Webconference

A Radicati Group Webconference The Radicati Group, Inc. www.radicati.com A Radicati Group Webconference The Radicati Group, Inc. Copyright September 2012, Reproduction Prohibited 9:30 am, PT September 27, 2012 The Radicati Group, Inc.

More information

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys By Ronald S. Allen, Esq. As technology has evolved, the federal courts have

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Addressing the Abandoned Email Archive Risk

Addressing the Abandoned Email Archive Risk Addressing the Abandoned Email Archive Risk WHITE PAPER Table of Contents 3 Executive Summary 3 Introduction 4 What are Email Archives? 4 EOL, Obsolete, and Abandoned Email Archives 5 The Risks and Costs

More information

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI

More information

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers MARCH 7, 2007 E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers By Tara Daub and Christopher Gegwich News of the recent amendments to the Federal Rules of Civil Procedure

More information

Clearwell Legal ediscovery Solution

Clearwell Legal ediscovery Solution SOLUTION BRIEF: CLEARWELL LEGAL ediscovery SOLUTION Solution Brief Clearwell Legal ediscovery Solution The Challenge: Months Delay in Ascertaining Case Facts and Determining Case Strategy, High Cost of

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Symantec Enterprise Vault E-Discovery Connectors

Symantec Enterprise Vault E-Discovery Connectors Symantec Enterprise Vault E-Discovery Connectors Extending chain of custody beyond Enterprise Vault Discovery Accelerator Overview Symantec Enterprise Vault Discovery Accelerator extends the basic search

More information

Discovery Data Management

Discovery Data Management Discovery Data Management in Practice Introductions Reveal Derick Roselli 949-280-3519 droselli@revealdata.com www.revealdata.com Program Outline Pre-Planning Stages Workflow Management Project Management

More information

Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs

Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs Today s topics 1. Technical Evidence Management Theory 2. Enterprise Archiving to Reduce Costs

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents DOCUMENT MANAGEMENT SOLUTIONS Speed the transition to an electronic environment Comprehensive, Integrated Management of Physical and Electronic Documents Store, protect and control your essential business

More information

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare 102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,

More information

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper BEYOND THE HYPE: UNDERSTANDING THE REAL IMPLICATIONS OF THE AMENDED FRCP PA G E : 1 BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure A Clearwell Systems

More information

THE E-DISCOVERY PLAYBOOK: A PROACTIVE TOOL FOR WINNING LITIGATION

THE E-DISCOVERY PLAYBOOK: A PROACTIVE TOOL FOR WINNING LITIGATION WHITE PAPER THE E-DISCOVERY PLAYBOOK: A PROACTIVE TOOL FOR WINNING LITIGATION By Ashley Watson FTI Technology is a business of FTI Consulting, Inc. All rights reserved. 1. INTRODUCTION So much has been

More information

Real World Strategies for Migrating and Decommissioning Legacy Applications

Real World Strategies for Migrating and Decommissioning Legacy Applications Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of

More information

E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation

E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation TABLE OF CONTENTS Introduction... 3 IMPACT OF CLOUD COMPUTING... 3 Enforcing data management policies... 3 Protecting

More information

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments Andres De Aguero, Senior Lead, Deloitte Consulting LLP David F. Axelrod, Director, Deloitte

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011 E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

PROCEDURES TO PROTECT YOURSELF AND YOUR CLIENT

PROCEDURES TO PROTECT YOURSELF AND YOUR CLIENT EDISCOVERY POLICIES AND CHECKLISTS FOR INSIDE AND OUTSIDE COUNSEL PROCEDURES TO PROTECT YOURSELF AND YOUR CLIENT Mike Minton Partner THOMPSON COBURN LLP One US Bank Plaza St. Louis, MO 63101 314 552-6081

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services ONE SOLUTION Maximize the Business Value of Your Information Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services In today s world, information whether in paper or digital

More information

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Brought to you by: ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Introduction: Rising costs of litigation The chance of your organization

More information

How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.

How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq. How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq. IMPORTANT NOTICE This publication is not a do-it-yourself guide to resolving employment disputes or handling

More information

Navigating Information Governance and ediscovery

Navigating Information Governance and ediscovery Navigating Information Governance and ediscovery Implementing Processes & Technology to Reduce Downstream ediscovery Cost and Risk Shannon Smith General Counsel, Globanet March 11 12, 2013 Agenda 1 Overview

More information

for Insurance Claims Professionals

for Insurance Claims Professionals A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to

More information

Special Report: ROI of Records Management for Legal Discovery

Special Report: ROI of Records Management for Legal Discovery Special Report: ROI of Records Management for Legal Discovery Page 1 Table of Contents Table of Contents 2 Introduction 3 2010 Litigation Cost Survey 3 Legal Discovery Process 4 ROI Scenarios 7 Other Savings

More information

POWER PROTECT PROMOTE. Information Governance In The Cloud

POWER PROTECT PROMOTE. Information Governance In The Cloud Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

ELECTRONIC DISCOVERY & LITIGATION SUPPORT

ELECTRONIC DISCOVERY & LITIGATION SUPPORT ELECTRONIC DISCOVERY & LITIGATION SUPPORT A Primer by MessageSolution, Inc. The recent influx of federal and industry email regulations combined with the increased use of electronic discovery in court

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information