2 Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc.
3 Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition of electronically stored information (ESI), production requirements, and expectations Rule 16(b), 26(f) Meet-and-confer sessions must address e-discovery and preservation Rule 26(b)(2) Production of data deemed not reasonably accessible because of undue burden or cost is not always required. Rule 26(b)(5) Claw back provision. Claims of privilege can be asserted after inadvertent production Rule 37(f) Safe harbor for parties that lose information as a result of routine, good faith, operation of IT systems *Amendments Dec
4 ediscovery Terminology Discovery the pre-trial lawsuit phase in which either party through the law of civil procedure can request evidence from other parties or can compel the production of evidence using discovery devices, such as requests for production & depositions ediscovery Discovery in civil litigation which deals with the exchange of information in electronic format (often referred to as Electronically Stored Information or ESI) Electronically Stored Information (ESI) information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software Early Case Assessment (ECA) estimating risk (cost of time and money) to prosecute or defend a legal case Legal Hold a process which an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. Amendments to the US FRCP in Dec 2006 addressed the discovery of electronically stored information (ESI), expanding the use of a "legal hold" beyond preservation of paper documents
5 ediscovery Background 90% of North American corporations are actively engaged in litigation 99% of all documents are stored electronically Inaccessible data becoming more accessible FRCP amendments specifically rules 26(b)(2)(B) and 34(b) eroding burden of cost defense for producing ESI Reasonably accessible ESI must likely be produced Outsourcing is no longer the best option Tight deadlines to prepare for opposing counsel negotiation (100 days: identify, review, Meet and Confer Vast amount of data makes outsourcing cost prohibitive
6 ediscovery Challenges Collecting electronically stored information (ESI) from various sources including , file, laptops & desktops Preserving responsive information with and Enterprise wide framework for Legal Hold Understanding liability through early case assessment Culling information prior to GC/attorney review Responsiveness in terms of the time/risk in providing information Identifying & classifying clientattorney privileged information Increasing lawyer efficiency both internally (corporate counsel) and externally (attorney) in review
7 Data Challenges Focusing on Retained Digital ESI Archive 4x the ESI to search and collect within 3 years
8 Process & Application Use
9 Why does this effect IT? Approaches to finding & collecting stuff - In place ESI search - Production driven ECA - Production legal hold - Forensic collection Duplicated Data End User Restriction Incomplete View - Rules specific archiving - Discovery against archive - Single instance archive - Archive based legal hold - Collection for export Potentially Responsive ESI Operational Infrastructure End User Impact Duplicated Data Siloed Risk - Unified Data Management - Deduplication of Data Copies - Online and offline data - Proactive allays ready - Controlled retention - Automated Legal Hold Ready state All sources of data No End User Impact Long term retention & disposition
10 The No. 1 Business Problem Retaining, Finding and Organizing Information Strategy & Policy Operations Business Area Business Area Business Area Process Process Process Workflow Workflow Information Assets Traditional Approaches Assets Managed in Silo s: Hard to find, Limited organization Issues around Duplication, Accessibility, Discovery, Security and Protection and Ultimately Cost
11 Watch Out!!! Data isn t being retained with way you think App Tier Information Information Object Information Object Object Archive Weekly Backup Weekly Backup 4 4 Weekly Backup Weekly Backup Weekly Backup TOTAL Copies 54+ The Question: Where to look? Tier 2 1 Archive Tier Tape 12 Monthly Backup Monthly Backup Monthly Backup Yearly Backup Yearly Backup Yearly Backup Monthly Backup Monthly Backup Monthly Backup Yearly Backup Yearly Backup Yearly Backup 3+ 1 Offline Tier 6 Weekly Backup Weekly Backup Weekly Backup 12 Monthly Backup Monthly Backup Monthly Backup Yearly Backup Yearly Backup Yearly Backup 3+
12 Process and IT Implication
13 Apply this across multiple ediscovery incidents
14 The IT problem defined Repetitive forensic search and collection leads to a siloed model from litigation Costs accumulate on a case basis with repeated and unnecessary IT duplication that plays forward into legal Applications and infrastructures are typically interrogated forensically with no thought for repetition, cost and storage Without prescriptive techniques that can identify ESI all data is often placed on hold ESI at the edge is difficult to identify and collect and incurs yet more cost "The definition of insanity is doing the same thing over and over and expecting it to come out different Benjamin Franklin ( )
15 The Proactive Way Collapsed processes
16 The Proactive Way Unified ESI/Data Management Strategy & Policy Operations Business Area Business Area Business Area Process Process Process Workflow Workflow Information Assets Ease of Access, Search & ediscovery Unified Policies, Reporting & Audit A Unified Approach Assets Managed and Classified within One Platform Technology Business Driven Information Access, ediscovery & Compliance is streamline through a Single Interface without the need for IT.
17 Product Workflow A proactive methodology Desktop / Latptop SharePoint & DBs Object Level Retention & Disposition Review Workflow Automated Classification & Rules based Workflow Policy driven classification Consistent review schemas Manual & automated processes Role based collaboration & sharing Customizable role based workflow Content Mining Search Review Custodian Unified Web Portal File Systems Exchange Domino ECA Analysis (Determine scope Of ESI collection) Move/Clone ESI (Archive/Backup /Collection) Legal Hold Preservation Data De-Dupe Across Tiers as it is Collected Index (Acquired Data) Legal Index & Search Content Index (File, File metadata, platform metadata and tags) Multiple File Formats Multiple Languages Preserve origination e.g. paths IT
18 ediscovery Roles IT & Legal; ECA, Legal Hold, Review, Export IT Liaison Para-Legal ECA Search Words / Phrases Date Range Source Location Custodian Entity Pattern Record Type Boolean Logic Data Set #1 Legal Hold #1 Collection - Initial Collection - All Custodians Review - Non-Responsive - Responsive Policies - Retention: Indefinite - Storage: Media #1 Release Data Set #2 Legal Hold #2 General Counsel Filter - Revised Custodians - Client:Attorney Priv Review - Non-Responsive - Questioned Policies - Retention: Indefinite - Storage: Media #1 Release Data Set #3 Legal Hold #3 Outside Counsel Qualification - Responsive - Client: Attorney Priv Export - XML Hold Report - Data ZIP File Policies - Retention: Indefinite - Storage: Media #1 Today Pre-Litigation In Litigation Engage Attorney s
19 Creating Information Governance Risk & Ownership by Stakeholder CIO Reduced long term cost of retention Ease of information access & recovery Virtual organization and sharing of individual and workgroup content General Counsel / Legal Preservation & reduced risk Customizable evidence management Records Manager / Compliance Employee/Company records retention Dispute identification & resolution Conformity with industry directives Supervision & monitoring of exposure content and events Application Owners / IT Manager Infrastructure operational efficiency Storage growth management & flexibility Backup / Storage guys in IT Reduced information recovery time Reduced storage & cost of ownership
20 What do you need in a solution Top Access & Retention Requirements Access 1. Fast & efficient enterprise search across all information repositories both in online (backup) & offline (archive) copies 2. Find duplicate copies, consolidate and save time, space & cost 3. Mine unstructured data for ECA to find important records based on meaning 4. Provide self service data recovery for lost of deleted content Retention 1. Manage legal preservation & workflow for ediscovery 2. Collect data for movement: records applications & datacenters 3. Implement retention schedules to specific content assets 4. Keep, supervise & review content for compliance and record keeping
21 Being Proactive Delivers.
22 Summary Being Proactive Means = Relying less on costly and reactive forensic custodian collection = Providing efficient & proactive ESI risk management = Reducing time to evidence identification & preservation = Reducing external legal review time & cost = Providing continued legal risk management
23 A Final Word Think Big! Unified Information Governance
White Paper May 2006 Applying Electronic Records Management in the Document Management Environment: An Integrated Approach Written by: Bud Porter-Roth Porter-Roth Associates Table of Contents Introduction
WHITE PAPER: DATA PROTECTION........................................ Your Backup Is Not an Archive Who should read this paper Backup Administrators, IT Administrators, IT Managers WHITE PAPER: DATA PROTECTION
Records Management Best Practices Guide A Practical Approach to Building a Comprehensive and Compliant Records Management Program Protecting and Managing the World s Information. Since 1951, Iron Mountain
Managing digital records without an electronic record management system Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of
ediscovery & Information Management Compliance and Litigation Readiness System The economic climate sparks more frequent and rigorous audits, investigative probes, and legal proceedings in which your organization
United States Government Accountability Office Report to the Subcommittee on the Legislative Branch, Committee on Appropriations, U. S. Senate March 2015 INFORMATION TECHNOLOGY Copyright Office Needs to
Guide for taxpayers Our approach to information gathering This publication is current at November 2013. For the most current version, visit our website at ato.gov.au/infogathering OUR COMMITMENT TO YOU
Cloud Service Level Agreement Standardisation Guidelines Brussels 24/06/2014 1 Table of Contents Preamble... 4 1. Principles for the development of Service Level Agreement Standards for Cloud Computing...
Job Family Standard for Administrative Work in the Information Technology Group, 2200 TABLE OF CONTENTS INTRODUCTION... 2 COVERAGE... 2 MODIFICATIONS TO AND CANCELLATIONS OF OTHER EXISTING OCCUPATIONAL
Request for Proposal #50019 Learning Management System and Implementation Services June 17, 2014 California Lottery 700 North 10th Street Sacramento, CA 95811 TABLE OF CONTENTS Page I. GENERAL INFORMATION
National Spatial Data Infrastructure Strategic Plan 2014 2016 Federal Geographic Data Committee December 2013 Federal Geographic Data Committee Federal Geographic Data Committee, Reston, Virginia: 2013
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Exploiting the Experience of Transformation IT Outsourcing 2006 IT World Limited on behalf of the BuyIT Best Practice Network Page 1 P12 IT Outsourcing May 2006 Forewords One of the prime objectives of
Joint UNECE/Eurostat/OECD Work Session on Statistical Metadata (METIS) Generic Statistical Business Process Model Version 4.0 April 2009 Prepared by the UNECE Secretariat 1 I. Background 1. The Joint UNECE
I D C I V I E W E x t r a c t i n g Value from Chaos June 2011 By John Gantz and David Reinsel Sponsored by EMC Corporation Content for this paper is excerpted directly from the IDC iview "Extracting Value
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) È Annual Report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the fiscal year ended
PoINT Storage Manager White Paper Index Abstract 1 The Challenge 2 Growth of Unstructured Data 2 Current Data Value 3 Archiving and Long-Term Preservation 4 Migration 4 The Concept 5 Tiered Storage Architecture
DIGITAL GOVERNMENT: BUILDING A 21 ST CENTURY PLATFORM TO BETTER SERVE THE AMERICAN PEOPLE MAY 23, 2012 Table of Contents Introduction 1 Part A. Information-Centric 9 1. Make Open Data, Content, and Web
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
HKSQC 1 Issued June 2009; revised July 2010, May 2013, February 2015 Effective as of 15 December 2009 Hong Kong Standard on Quality Control 1 Quality Control for Firms that Perform Audits and Reviews of
RECORDS MANAGEMENT MANUAL Date: September, 2007 Authored By: University Archives Contents 1. Records Management at UBC 3 A) Purpose of The Records Manual 3 B) Benefits of Records Management 3 C) Some Records
Trusted Digital Repositories: Attributes and Responsibilities An RLG-OCLC Report RLG Mountain View, CA May 2002 2002 Research Libraries Group All rights reserved First published in May 2002 Adobe and Acrobat
IFRS for Investment Funds More Than Just Accounting and Reporting Table of Contents Industry Views on IFRS for Investment Funds... 2 Other Standard Setting Considerations... 2 Challenges and Opportunities
CLOUD COMPUTING: IS YOUR COMPANY WEIGHING BOTH BENEFITS & RISKS? Toby Merrill CLOUD COMPUTING: IS YOUR COMPANY WEIGHING BOTH BENEFITS & RISKS? Toby Merrill Toby Merrill, Thomas Kang April 2014 Cloud computing
A Forrester Consulting Thought Leadership Paper Commissioned By SAP Real-Time Data Management Delivers Faster Insights, Extreme Transaction Processing, And Competitive Advantage June 2013 Table Of Contents