A Best Practice Framework for Data Acquisition

Size: px
Start display at page:

Download "A Best Practice Framework for Data Acquisition"

Transcription

1 A Best Practice Framework for Data Acquisition Corporate Headquarters 595 Greenhaven Road Pawcatuck, CT US European Office London, United Kingdom P: F:

2 Electronic data and electronic evidence. Finding it, accessing it and collecting it can be a daunting process. As the role of electronic data becomes increasingly more critical to the litigation process, it s imperative to develop rigorous protocols and procedures for data acquisition. The Oliver Group has spent years defining, building and implementing a best practices approach to the acquisition process. Based on international standards, direct experience and technical expertise, our proven framework has helped us successfully manage engagements across multiple jurisdictions. At a high level, the data acquisition process typically can be broken into three phases: Secure communication procedures Incident handling and escalation paths Status meeting schedule Initial documentation/information request list The assessment process Every organization varies in its organization, infrastructure, technical environment, and culture. As a result, the engagement must be tailored to meet the unique requirements of the situation to ensure the complete and accurate capture of the dataset. The assessment process consists of: Administrative Discovery Technical Discovery Data Acquisition Action Plan Step One Administrative Discovery Phase One: Planning The planning phase allows The Oliver Group to refine the engagement strategy to meet the specific needs of the company. Ideally the planning phase should begin with a kickoff meeting that defines and validates the overall approach, and ends with stakeholder signoff. Without agreement and understanding among the stakeholders at the outset, the likelihood of errors, delays and increased cost rises. The kickoff meeting should, at a minimum; cover the following items: Administrative discovery is all about understanding the root cause of the inquiry for information and the entities and people that may be involved. It is important to consider is who is the main driver of the process: internal legal departments, outside counsel or regulatory entities. How data is acquired and handled may vary depending on the nature of the inquiry, which may be as a result of: Government investigation Internal audit request/investigation or other sources Criminal or civil litigation Initial rules-of-engagement Identification of project stakeholders High level goals and objectives The Oliver Group l 2

3 The final element of administrative discovery is getting a clear picture of organizational layout and the flow of information between departments and individuals. This provides a roadmap of where key players sit within the organization and what are the most appropriate places to look for key custodian data. All of these facets must be taken into consideration because they have a direct impact on the project and its ultimate deliverables. For example, choosing a forensic acquisition approach instead of a non-forensic approach has significant impact on the entire electronic discovery process and the accessibility of certain data post-acquisition. Step Two: Technical Discovery An understanding of the client s specific technical environment is critical to determining the scope of collection, the necessary tools and resources required, and formation of an appropriate action plan. The Oliver Group works in concert with clients to acquire specific technical information spanning several key areas (see chart). This upfront process can be completed by the client s internal IT and compliance staff, however, The Oliver Group frequently works with corporate clients and law firms in an advisory capacity to: Develop a litigation readiness plan which evaluates these areas in advance of an event Assist with locating and accessing relevant data Generate the specific strategy and tactics of collection Provide technical oversight and guidance The Oliver Group l 3

4 Step Three: Collection Plan Upon assessment of all pertinent information, The Oliver Group, in conjunction with the client, develops a Data Acquisition Action Plan which consists of the following aspects: The Oliver Group l 4

5 Phase Two: Collection Phase Two encompasses the actual collection of electronic data and is structured entirely to address the findings and action plan agreed upon in Phase One. A typical data acquisition project may include: Locating data deemed relevant on local drives or networks Verification that all relevant files have been located Documentation of all harvested data Installation of data capture devices and confirmation of capture location Accessing relevant and file server data Creation of separate archive files for both file server and data Providing a final report of collected files During acquisition, The Oliver Group preserves all data associated with the electronic file including: Naming conventions Path structure System level metadata (filename, create date, modify date, last access date, and original file location) File level metadata (internal fields storing information such as author, subject, summary, etc) Experts and Teams Due to the complexity of the data acquisition process it s imperative to build the right acquisition team and enhance it with individual experts as necessary. Data acquisition teams typically will include a combination of senior level consultants and systems engineers with backgrounds in a variety of relevant fields: Computer forensics Data collection Media restoration Electronic discovery processing Acquisition Tools Depending on the requirements of the project, a variety of acquisition tools may be used to automate and support the collection effort. The Oliver Group has developed a proprietary set of tools to enhance industry standard tools. The Oliver Group s approach to acquiring data is in accordance with forensically sound practices, ensuring data integrity is maintained throughout the process. A combination of standard and proprietary applications is used to locate and collect client data along with the appropriate tools for managing the logistics of the project. Acquisition Procedures The Oliver Group s benchmark methodology was developed through extensive work on large scale acquisition projects. We ve developed a streamlined, efficient process to acquire massive amounts of data as well as the needle in a haystack variety. This capability can only be found among service providers who have deep technical expertise and real world experience with the electronic data discovery process. The Oliver Group l 5

6 The core procedure model for data acquisition within an enterprise includes: Creating A Master Custodian List The custodian list is comprised of all relevant custodian names that are supplied by the client s IT staff and their counsel. Forming a comprehensive, accurate master list is an essential element to protecting data integrity, maintaining chain of custody, and ensuring that every responsive file for each custodian is collected. The master custodian list serves as a blueprint for the collection and tracking of custodian data. The list can only be developed if there is a full understanding of the client s technical environment, current and historic data archiving, data identification, and data storage procedures. Custodian Naming Due to the uniqueness of client environments and naming structures, a variety of challenges can develop that may impact the accuracy and completeness of a data set, including: Changes in last names (e.g., marriage) Different names that could generate a similar naming structure (for example: Jen Smith and John Smith could generate a similar jsmith naming structure) A change by the client s IT department to the custodian coding/naming structure of employees for the organization, including id type naming conventions which have no reference to a custodian without a key To combat these challenges, The Oliver Group has developed quality control measures such as: Working with the client IT staff to gain all account information for all relevant custodians Cross checking all user naming/ identification conventions with the client s IT administration Verifying custodian information post extraction by sampling data to confirm correct custodian name and naming convention File Tracking Every relevant file for every user must be tracked and accounted for during data collection. The Oliver Group acquisition teams utilize approved forms and standardized documents to track: Collection components Key collection metrics The collection and delivery of files for further electronic discovery processing Acquisition Logs To accurately document acquisition activities, The Oliver Group utilizes a series of collection logs and reports designed to maintain all relevant details associated with data collected. These logs capture: Which drives, folders and files have been accessed The date, time, and location of the collection Full path names Where data has been transferred Notes about the collection Size of data collected Hash values if applicable The Oliver Group uses a combination of detailed event logs, media intake logs and data restoration logs (as well as others depending on the project) to provide a complete audit trail covering data acquisition to data delivery. The Oliver Group l 6

7 Phase Three: Closeout Data Transfer and Delivery Once data is collected, it must then be transferred and transported to a processing facility. The Oliver Group recommends placing collected data onto external hard drives. This media type allows for the easiest transportation of the data and simplifies the subsequent transition into the restoration process. All data transfer is recorded and documented in Chain of Custody logs, to assure that all data and media are accounted for at all times. Special precautions should be taken when packaging, transporting, and storing electronic media. The Oliver Group recommends that media be shipped in secure, hard-case containers designed specifically for the shipment of the particular media type. These containers should be designed to protect the media against temperature fluctuation, humidity fluctuation, physical shock, and electrostatic discharge. By doing so, clients minimize the chance of source media being tampered with or otherwise damaged. It is also important to include a manifest of the shipment s contents in each container. This manifest should clearly indicate the contents of the shipment and the project to which it belongs, along with information about the client s point-of-contact should there be any questions or issues related to the shipment. Many clients have standardized formats for their shipment manifests and Chain-of-Custody documentation, however, The Oliver Group will provide templates upon request. The method of shipment is determined by the client s needs and preferences. Shipping methods range from utilization of large scale commercial services such as FedEx and UPS, to secure courier services. The Oliver Group is also equipped to transport the media once a phase of the collection or the entire collection process is complete. is generated to provide an accurate means of correlating collected data to its source. The Oliver Group s data collection policies are designed to adhere to the strict chain of custody procedures which investigations of this nature demand. The Oliver Group maintains strict Chain-of- Custody procedures, designed to ensure the security and integrity of clients data. Upon receipt of media, The Oliver Group conducts a catalog of the collected data s contents. This includes a physical inspection of the media, creation of the Chain-of-Custody Document and the recording of any documentation included with the shipment. The Chain-of-Custody documents serve as comprehensive tape inventory reports and are maintained by The Oliver Group throughout the project s lifecycle. Clients are provided with copies of the Chainof-Custody documents for their records. Media Preservation Upon completion of the intake process, media is housed within The Oliver Group s secure media library. For active processing, media is checked out of the library and transferred to our production area, which is accessible only to senior executives and authorized production team. Conclusion Collecting electronic data is a sophisticated and complex process. By working with The Oliver Group, clients leverage The Oliver Group s unique expertise in data recovery and our proven experience in managing large scale data collection projects. Through The Oliver Group, clients access a technical team that has developed collection methodologies built upon the principles of data integrity and chain of custody. They tap into the knowledge of The Oliver Group s engineers who have knowledge and skill sets spanning the areas of computer forensics, data collections, data restoration, and electronic discovery processing. Chain-of-Custody The Oliver Group ensures that all data collected is tracked precisely throughout the project s lifecycle and that a documented source history The Oliver Group l 7

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our

More information

Data Protection. Secure Media Management. Offsite Tape Vaulting Drives Efficiencies, Enhances Control and Improves Audit Readiness

Data Protection. Secure Media Management. Offsite Tape Vaulting Drives Efficiencies, Enhances Control and Improves Audit Readiness Data Protection Secure Media Management Offsite Tape Vaulting Drives Efficiencies, Enhances Control and Improves Audit Readiness Data Protection Safeguarding your organization s information with: Media

More information

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in

More information

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our stock price tumbling. I need to minimize our

More information

ediscovery Solution for Email Archiving

ediscovery Solution for Email Archiving ediscovery Solution for Email Archiving www.sonasoft.com INTRODUCTION Enterprises reliance upon electronic communications continues to grow with increased amounts of information being shared via e mail.

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The

More information

From Chaos to Clarity.

From Chaos to Clarity. LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners

More information

A Websense White Paper Websense CloudMerge Ingestion Service

A Websense White Paper Websense CloudMerge Ingestion Service A Websense White Paper Websense CloudMerge Ingestion Service Table of Contents Introduction... 3 Legacy Data...... 3 Chain of Custody...... 3 Websense Data Import Process.... 4 Top Nine Things to Know

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

Union County. Electronic Records and Document Imaging Policy

Union County. Electronic Records and Document Imaging Policy Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability

More information

Accelerate your mission with GTSI Integration Services

Accelerate your mission with GTSI Integration Services Accelerate your mission with GTSI Integration Services GTSI delivers deep technical expertise and integrates advanced computer and networking technologies. Organizations requiring technology integration

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,

More information

Guide to advanced ediscovery solutions

Guide to advanced ediscovery solutions RCLS Services & Technology Guide to advanced ediscovery solutions Océ Business Services Records, Compliance and Legal Solutions Products and Services Océ Business Services has earned the reputation as

More information

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform

More information

Data Management Implementation Plan

Data Management Implementation Plan Appendix 8.H Data Management Implementation Plan Prepared by Vikram Vyas CRESP-Amchitka Data Management Component 1. INTRODUCTION... 2 1.1. OBJECTIVES AND SCOPE... 2 2. DATA REPORTING CONVENTIONS... 2

More information

HKITPC Competency Definition

HKITPC Competency Definition HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment,

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Leveraging enterprise data and advanced analytics in core operational processes: Demand forecasting at Cisco

Leveraging enterprise data and advanced analytics in core operational processes: Demand forecasting at Cisco Leveraging enterprise data and advanced analytics in core operational processes: Demand forecasting at Cisco This case was prepared by Blake Johnson of the Management Science & Engineering Department at

More information

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just

More information

Real World Strategies for Migrating and Decommissioning Legacy Applications

Real World Strategies for Migrating and Decommissioning Legacy Applications Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of

More information

Discovery Data Management

Discovery Data Management Discovery Data Management in Practice Introductions Reveal Derick Roselli 949-280-3519 droselli@revealdata.com www.revealdata.com Program Outline Pre-Planning Stages Workflow Management Project Management

More information

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012 SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use

More information

OPTIMUS SBR PROCESS IMPROVEMENT. Streamline your outdated process for maximum efficiency. CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

OPTIMUS SBR PROCESS IMPROVEMENT. Streamline your outdated process for maximum efficiency. CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Streamline your outdated process for maximum efficiency. PROCESS IMPROVEMENT WHO WE ARE OPTIMUS SBR is a management consulting firm focused on supporting

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge Best Practices Guide HIPAA Primer series HEALTHCARE Iron Mountain Records Management Services HIPAA-Compliant Solutions that keep you compliant Contents 3 Physical Records: The Ongoing Compliance Challenge

More information

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict

More information

White Paper: Managing ediscovery Initiatives In-House. Managing ediscovery Initiatives In-House

White Paper: Managing ediscovery Initiatives In-House. Managing ediscovery Initiatives In-House White Paper: Managing ediscovery Initiatives In-House Managing ediscovery Initiatives In-House Introduction Traditionally, enterprises responding to litigation, compliance, auditing or similar events

More information

Incident Management & Forensics Working Group. Charter

Incident Management & Forensics Working Group. Charter Incident Management & Forensics Working Group Charter February 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print,

More information

Title: Harnessing Collaboration: SharePoint and Document Management

Title: Harnessing Collaboration: SharePoint and Document Management Title: Harnessing Collaboration: SharePoint and Document Management News Outlet: ECM Connection Author: Bob Dickerson Author Bio: Bob Dickerson is vice president of DocPoint Solutions, a subsidiary of

More information

Subject Area 1 Project Initiation and Management

Subject Area 1 Project Initiation and Management DRII/BCI Professional Practice Narrative: Establish the need for a Business Continuity Plan (BCP), including obtaining management support and organizing and managing the BCP project to completion. (This

More information

IBM Enterprise Content Management: Streamlining operations for environmental compliance

IBM Enterprise Content Management: Streamlining operations for environmental compliance Solution Brief IBM Enterprise Content Management: Streamlining operations for environmental compliance Highlights Helps improve operational efficiency and lower costs Provides capabilities that enable

More information

Process Assessment and Improvement Approach

Process Assessment and Improvement Approach Process Assessment and Improvement Approach June 2008 The information contained in this document represents the current view of Virtify on the issues discussed as of the date of publication. Virtify cannot

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Maximizing the benefits of USPS Full-Service Intelligent Mail

Maximizing the benefits of USPS Full-Service Intelligent Mail White paper Shipping & Mailing Parcel & Mail Sorting Maximizing the benefits of USPS Full-Service Intelligent Mail It improves the value of client communications and helps you control costs and streamline

More information

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance S E P T E M B E R 2 0 1 3 Comply or Perish: The biggest challenges of Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

Manage IT Service Continuity and Availability

Manage IT Service Continuity and Availability Manage IT Service Continuity and Availability Description School jurisdictions are increasingly dependent upon IT services to support day-to-day activities. The process of managing IT ensures that IT services

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive

More information

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment. Security Services A Solution for Providing BPM of Security Services within the Enterprise Environment. First steps towards Next Generations Operations (OPS) to drive Gross Margin Dear security colleagues,

More information

Complete Document & Process Management for Life Sciences on SharePoint 2010

Complete Document & Process Management for Life Sciences on SharePoint 2010 TM ComplianceSP TM on SharePoint 2010 Complete Document & Process Management for Life Sciences on SharePoint 2010 Overview With increasing pressure on costs and margins across Life Sciences, the Industry

More information

APPENDIX B TO REQUEST FOR PROPOSALS

APPENDIX B TO REQUEST FOR PROPOSALS Overview and Instructions APPENDIX B The service provider s responsibilities will include the following: (A) Processing of ESI produced to CTAG in a variety of file formats; (B) Hosting ESI produced to

More information

Project Management Office Charter

Project Management Office Charter Old Dominion University Office of Computing and Communication Services Project Management Office Charter Version: 1.0 Last Update: February 18, 2010 Created By: Anthony Fox, PMP OCCS Project Management

More information

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current

More information

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices How to Manage Costs and Expectations for Successful E-Discovery: Best Practices Mukesh Advani, Esq., Advisory Board Member, UBIC North America, Inc. UBIC North America, Inc. 3 Lagoon Dr., Ste. 180, Redwood

More information

CHARTER. Interagency Information Systems Working Group. Timber Regulation and Forest Restoration Program June 23, 2015

CHARTER. Interagency Information Systems Working Group. Timber Regulation and Forest Restoration Program June 23, 2015 Mission and Background CHARTER Interagency Information Systems Working Group Timber Regulation and Forest Restoration Program June 23, 2015 The Mission of the Interagency Information Systems (IIS) Working

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

Improving Service Asset and Configuration Management with CA Process Maps

Improving Service Asset and Configuration Management with CA Process Maps TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION

More information

Making the Cloud a Safe and Secure Place for Data

Making the Cloud a Safe and Secure Place for Data ArkivumLimited R21 Langley Park Way Chippenham Wiltshire SN15 1GE UK +44 1249 405060 info@arkivum.com @Arkivum arkivum.com Making the Cloud a Safe and Secure Place for Data Whitepaper 1 / 5 Introduction

More information

Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery,

Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, Computer Forensics & Electronic Discovery Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis

More information

EXPLORING THE CAVERN OF DATA GOVERNANCE

EXPLORING THE CAVERN OF DATA GOVERNANCE EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance

More information

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION 3 EFFECTIVELY MANAGE THE SCOPE OF YOUR IMPLEMENTATION

More information

Building a Data Quality Scorecard for Operational Data Governance

Building a Data Quality Scorecard for Operational Data Governance Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...

More information

Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain.

Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain. escrow Software Escrow Service Workflow Comprehensive and Trusted Software Escrow Services from Iron Mountain. Get it right every time. Mission-critical technology is everywhere, and you depend on it every

More information

www.istdiscover-e.com

www.istdiscover-e.com www.istdiscover-e.com who is IST? IST ediscovery provides a full range of on-site litigation support and off-site ediscovery services that will take you from Early Case Assessment (ECA) through hosted

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through

More information

A Global IT Managed Service Provider

A Global IT Managed Service Provider A Global IT Managed Service Provider Service Catalog 2013 www.presilient.com We help ensure that you maximize your current infrastructure investments, while increasing performance across your enterprise.

More information

INFORMATION ACCESS OPERATIONS LIST OF CORE SERVICES TO MINISTRY CLIENTS

INFORMATION ACCESS OPERATIONS LIST OF CORE SERVICES TO MINISTRY CLIENTS INFORMATION ACCESS OPERATIONS LIST OF CORE SERVICES TO MINISTRY CLIENTS NOTE: Reflects core services derived from Target IAO Business Operations Design, May 2009 FREEDOM OF INFORMATION BUSINESS PROCESS

More information

Project Management Guidelines

Project Management Guidelines Project Management Guidelines 1. INTRODUCTION. This Appendix (Project Management Guidelines) sets forth the detailed Project Management Guidelines. 2. PROJECT MANAGEMENT PLAN POLICY AND GUIDELINES OVERVIEW.

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information

More information

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage

More information

BlitzDocs Product Brief. Intelligent collaboration in the mortgage process

BlitzDocs Product Brief. Intelligent collaboration in the mortgage process BlitzDocs Product Brief Intelligent collaboration in the mortgage process Intelligent collaboration in the mortgage process Your business is specific to your processes and your trading partners. That is

More information

Our solutions reduce costs, streamline process and increase efficiencies. Facilities Management Litigation and Document Solutions

Our solutions reduce costs, streamline process and increase efficiencies. Facilities Management Litigation and Document Solutions Discover Possibilities With Pitney Bowes Legal Solutions Our suite of solutions is the differentiator in today s complex legal environment. We manage the business of law Pitney Bowes is the market leader

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

ILM et Archivage Les solutions IBM

ILM et Archivage Les solutions IBM Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance

More information

Quality Manual. DuraTech Industries, Inc. 3216 Commerce Street La Crosse, WI 54603 MANUAL SERIAL NUMBER 1

Quality Manual. DuraTech Industries, Inc. 3216 Commerce Street La Crosse, WI 54603 MANUAL SERIAL NUMBER 1 Quality Manual Approval Page Document: QA1000 Issue Date: 5/29/1997 Page 1 of 17 Revision Date: 5/20/2013 DuraTech Industries, Inc. 3216 Commerce Street La Crosse, WI 54603 MANUAL SERIAL NUMBER 1 This

More information

How Technology Supports Project, Program and Portfolio Management

How Technology Supports Project, Program and Portfolio Management WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY

More information

Are Mailboxes Enough?

Are Mailboxes Enough? Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day

More information

Internal Audit Checklist

Internal Audit Checklist Internal Audit Checklist 4.2 Policy Verify required elements Verify management commitment Verify available to the public Verify implementation by tracing links back to policy statement Check review/revisions

More information

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS DIGITAL FORENSIC TECHNOLOGY Key Terms and Definitions Forensic Technology e-discovery Computer Forensics Data Analysis / Data Mining FRCP - Revised Key Terms and Definitions Forensic Technology - The application

More information

Agreement Elements for Outsourcing Transfer of Born Digital Content

Agreement Elements for Outsourcing Transfer of Born Digital Content Agreement Elements for Outsourcing Transfer of Born Digital Content Ricky Erway OCLC Research Ben Goldman Pennsylvania State University Matthew McKinley University of California, Irvine 2014 OCLC Online

More information

The Benefits of Archiving and Seven Questions You Should Always Ask

The Benefits of Archiving and Seven Questions You Should Always Ask ArkivumLimited R21 Langley Park Way Chippenham Wiltshire SN15 1GE UK +44 1249 405060 info@arkivum.com @Arkivum arkivum.com The Benefits of Archiving and Seven Questions You Should Whitepaper 1 / 6 Introduction

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

COMMUNICATIONS MANAGEMENT PLAN <PROJECT NAME>

COMMUNICATIONS MANAGEMENT PLAN <PROJECT NAME> COMMUNICATIONS MANAGEMENT PLAN TEMPLATE This Project Communications Management Template is free for you to copy and use on your project and within your organization. We hope that you find this template

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Ten practical steps for streamlining e-discovery from a lawyer s perspective

Ten practical steps for streamlining e-discovery from a lawyer s perspective 52 / 65 Chapter 10 Ten practical steps for streamlining e-discovery from a lawyer s perspective In Ireland, as in other common law jurisdictions, parties to civil legal disputes are required to formally

More information

Biorepository and Biobanking

Biorepository and Biobanking Biorepository and Biobanking LabWare s solution for biorepositories and biobanks combines powerful specimen tracking and logistics capabilities with specimen processing and workflow management features.

More information

Applying ITIL v3 Best Practices

Applying ITIL v3 Best Practices white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version

More information

White Paper. Authenticating Digital Evidence Identify and Avoid the Weak Links in Your Chain of Custody

White Paper. Authenticating Digital Evidence Identify and Avoid the Weak Links in Your Chain of Custody White Paper Chain of Custody Authenticating Digital Evidence Identify and Avoid the Weak Links in Your Chain of Custody M E R R I L L L E G A L S O L U T I O N S Contents Introduction 1 Stages of electronic

More information

Section 1 Project Management, Project Communication/Process Design, Mgmt, Documentation, Definition & Scope /CRO-Sponsor Partnership

Section 1 Project Management, Project Communication/Process Design, Mgmt, Documentation, Definition & Scope /CRO-Sponsor Partnership Section 1 Project Management, Project Communication/Process Design, Mgmt, Documentation, Definition & Scope /CRO-Sponsor Partnership PROJECT MANAGEMENT - SCOPE DEFINITION AND MANAGEMENT Understands the

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

Misplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager

Misplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager Misplaced Trust: Vendor Fraud IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager April 17, 2015 Today s Discussion Summary Vendor fraud is a form of occupational fraud

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information