I D C ' s W o r l d w i d e L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y,

Size: px
Start display at page:

Download "I D C ' s W o r l d w i d e L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, 2 0 0 9"

Transcription

1 I N D U S T R Y D E V E L O P M E N T S A N D M O D E L S I D C ' s W o r l d w i d e L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Vivian Tero I D C O P I N I O N Global Headquarters: 5 Speen Street Framingham, MA USA P F This IDC study provides an overview of IDC's legal discovery infrastructure competitive market segment. This document provides an overview of the research methodology, definitions, and segmentation of the legal discovery infrastructure competitive market to help clients understand how the program sizes and forecasts the opportunity for players within this market. Key details to note are: Competitive markets are defined as combinations of whole or fractions of functional markets (hardware, software, and services) that reflect such market dynamics as the problem being solved or the technology on which it is based. The legal discovery infrastructure competitive market is a vertical slice of the broader compliance infrastructure competitive market, which can be segmented into two distinct but overlapping competitive segments information management governance, risk, and compliance (GRC) and IT operations GRC. Legal discovery is embedded in the information management GRC category. The market for legal discovery therefore includes the use of information technology to manage both physical and electronically generated information and records, taking into account the unique requirements of the access, retention, and integrity of electronically generated information. Technology solutions are employed by corporate litigants to document and manage the electronic discovery (ediscovery) business protocols, manage the disposition and retention of potentially relevant electronically stored information (ESI) in a legally defensible manner, contain information mismanagement risks, and provide the corporate litigants and legal counsels with the information they require to craft and execute their legal strategy. Managing ESI for legal discovery also impacts the corporation's disaster recovery, business continuity, acceptable use and communications, and data privacy objectives. Legal discovery requirements therefore influence spending on storage services, IT infrastructure services, security services, and hardware. IDC's worldwide legal discovery infrastructure research does not include the solutions and technologies that enable the presentation phase of the electronic discovery reference model (EDRM). Filing Information: June 2009, IDC #218532, Volume: 1, Tab: Markets Compliance Infrastructure: Industry Developments and Models

2

3 I N T H I S S T U D Y This IDC study provides an overview of IDC's legal discovery infrastructure market research taxonomy. Legal discovery infrastructure is a competitive market and a segment of the information management GRC competitive market. Information management GRC is a component of the broader compliance infrastructure competitive market. (For more information on this, see IDC's Worldwide Compliance Infrastructure Taxonomy, 2009, IDC #217572, March 2009.) The IDC legal discovery infrastructure taxonomy document provides an overview of the research methodology, definitions, and segmentation to help clients understand how the program sizes and forecasts the opportunity for players within this market. S I T U A T I O N O V E R V I E W G o v e r n a n c e, R i s k M a n a g e m e n t, a n d C o m p l i a n c e a n d t h e C o m p l i a n c e I n f r a s t r u c t u r e C o m p e t i t i v e M a r k e t Compliance Regulations are, by their very nature, descriptive. IT compliance interprets these regulations into a set of policies, identifies the associated storage and computing assets that are impacted by these policies, and defines the appropriate controls and control objectives. IT compliance therefore formalizes the content, framework (such as CobiT), and associated activities that corporations would adopt based on their interpretation of the law, regulation, and corporate policies. IT compliance includes the corporation's information management and storage infrastructure, acceptable use, data privacy, application availability and performance, and information security policies. The controls and control objectives allow the company to define its baseline (or desired state) by which ongoing IT compliance operations will be measured. Risk Management Risk management provides a disciplined approach to managing uncertainty by identifying potential risks, defining the organization's tolerance or appetite for risks relative to the benefits and the cost of mitigating such risks, assigning probabilities of the occurrence of risks, developing strategies to manage risk, and prioritizing assets and resources accordingly. Corporations typically classify their risk management efforts into the following broad categories that are oftentimes intertwined: operational risk, legal and compliance risk, financial risk, strategic risk, geopolitical risk, and environmental risk. IT compliance primarily centers on addressing legal and regulatory risks, although it may also include elements of strategic and operational risks. IT risk management enforces a structure that enables IT organizations to manage uncertainty in the IT environment such as application outages, the creation of new vulnerabilities resulting from unplanned changes, and violations of the firm's information management and retention policies. IT risk management goes beyond the IT security discipline (although this will continue to be a major component) to include the firm's IT operations, applications development, and information and storage 2009 IDC #

4 management practices. The ability to encapsulate the linkages between a potential material event and its risk profile, the affected information, and storage assets and computing resources, as well as the overlapping and compensating controls, is best achieved through automation. Automation enforces consistency in the enforcement, auditing, and reporting of policies and risk mitigation efforts. Governance According to the IT Governance Institute, IT governance consists of the leadership, organizational structures, and processes that allow an IT organization to sustain and extend a firm's strategies and objectives. IT governance and the effective application of an IT governance framework are critical in helping enterprises gain more value from information and information technology while ensuring that IT remains aligned with the enterprise strategy, values, and culture. Effective IT governance formalizes IT oversight and accountability. It facilitates resource allocation and decision making and enhances communication and performance between business units and IT and across IT functional silos. IT governance also facilitates compliance and audits by documenting processes, controls, and decision authority. Compliance Infrastructure Governance, risk management, and compliance disciplines are inexorably intertwined. The solutions that organizations employ to enforce operational and financial management accountability and facilitate the allocation of people, processes, and IT assets, while enforcing their information management, resiliency, availability, and security objectives, make up the compliance infrastructure competitive market. IDC considers compliance infrastructure as a competitive market, which IDC defines as combinations of whole or fractions of functional markets (hardware, software, and services) that reflect such market dynamics as the problem being solved or the technology on which it is based. A functional market is defined in terms of the features, functions, and attributes of the technology, rather than the usage or problem being solved. Competitive markets are typically more ad hoc because they are meant to reflect current market approaches, coalitions, standards, and software architectures. Some competitive markets have been modeled to address a broad solution market category. Others, for example, define a market view particular to an architecture. IDC utilizes prior IDC research into the system and network management software, security, storage, collaborative applications, and content applications secondary software markets spending, as well as the associated services and hardware required to deliver the solution, as the baseline for this analysis. IDC's information technology taxonomy represents a collectively exhaustive and mutually exclusive view of the worldwide information technology marketplace. This taxonomy is the basis for the relational multidimensional schema of IDC's IT Spending Black Book and Market Forecaster research database. The information from these continually updated databases is used to generate consistent market sizing and forecasts. 2 # IDC

5 C o m p l i a n c e I n f r a s t r u c t u r e T e c h n o l o g y P i l l a r s The compliance infrastructure competitive market is made up of the infrastructure technology pillars described in the sections that follow. IT Policies and Controls Management These solutions support the policies' documentation and the mapping of regulatory, legal, and IT operations and risk management policies to the relevant applications, databases, systems, and business and systems custodians. Critical capabilities include the ability to encapsulate the control metrics and the associated risks profiles and tolerance levels, provide workflows that automate the risks assessment process, and support the mapping of IT policies to the "custodian" of the business process and IT assets, as well as enable the capture of the custodians' attestation of their responsibilities and activities related to the IT compliance requirements. IT Policy Execution At a high level, solutions in this area facilitate the secure use and sharing of business information within and across the enterprise; support the movement of information across the enterprise records and information infrastructure; ensure the availability and integrity of the information; enable enterprises to better manage changes in their IT environment; ensure agreed-upon SLAs and continuous services and the availability of the IT processes; and address IT operations security, including perimeter and network security, controlled access, and acceptable use. The solutions in this area are therefore made up of existing records management, information infrastructure, IT operations, availability, and security applications. Controls Testing, Monitoring, Remediation, and Reporting Solutions in information management, storage, security, and system and network management have native capabilities to test, monitor, audit, remediate, and report compliance or noncompliance to policies. Governance, risk management, and compliance objectives require IT operations, audit, and risk professionals to make sense of activities log across a myriad of applications and systems. Integrated compliance monitoring, audit, remediation, and reporting solutions focus on automating the workflows that facilitate these activities across diverse applications and systems, relative to the key risks metrics and control objectives defined in the IT Policies and Controls Management section. C o m p l i a n c e I n f r a s t r u c t u r e C o m p e t i t i v e S e g m e n t s Compliance infrastructure technologies enable an organization to demonstrate a level of control over four key attributes: Information integrity IT process integrity Controlled access 2009 IDC #

6 Information retention The spending trends point to two major subcategories within the compliance infrastructure competitive market: Information management GRC. Legal discovery, regulatory-mandated information retention, and data privacy are the primary motivators for investments in information management GRC. Corporate activities are primarily focused on the retention and disposition of data. Corporations are also looking to automate information management processes and demonstrate the consistent enforcement of their retention, disposition, preservation, and acceptable use policies. IT operations governance, risk management, and compliance (IT Ops GRC). Activities and investments focus primarily on ensuring the process integrity, security, and resiliency of the IT environment. Information management GRC focuses primarily on the information management and storage infrastructure operations, while IT operations GRC centers on technical process integrity on the computing resources layer of the IT stack. The technical processes for demonstrating controlled access and information integrity are the primary areas of overlaps across the information management GRC and IT operations GRC segments. Figure 1 illustrates IDC's view of competitive market structure of the compliance infrastructure competitive market. F I G U R E 1 I D C ' s C o m p l i a n c e I n f r a s t r u c t u r e C o m p e t i t i v e M a r k e t M o d e l, Source: IDC, # IDC

7 L e g a l D i s c o v e r y Legal discovery is defined as the efforts of a party to a lawsuit and its legal counsel to obtain information before trial through demands for production of documents, depositions of parties and potential witnesses, written interrogatories, written requests for admissions of fact, examination of the scene, and petitions and motions employed to enforce discovery rights. The theory behind broad rights of discovery is that all parties will go to trial with as much knowledge as possible and that neither party should be able to keep secrets from the other (except for constitutional protection against self-incrimination). The explosion in the volume of electronic data generated during the normal course of business and the ability of information technologies to capture and maintain several copies (including different versions of working drafts) of documents underscore the challenges companies face in managing information for electronic discovery. It also highlights why the courts do not equate paper-based discovery with electronic discovery. According to the Sedona Principles, there are many ways in which producing electronic documents is qualitatively and quantitatively different from producing paper-based documents. These differences are defined by a set of broad categories, including volume and duplicability, persistence, changeable content, obsolescence, and dispersion and searchability. The unique characteristics of legal discovery for electronically generated information are particularly obvious during the collection, paring, and review phases. The Sedona Conference is a nonprofit, 501(c)(3) research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights. (For more information on the Sedona Conference and the Sedona Principles, see Despite critical differences between paper-based and electronic discovery, the underlying legal discovery and litigation support processes are similar, as discussed in subsequent sections. Litigation involves both paper-based and electronically generated responsive materials. Physical records are eventually scanned into electronic format (through an OCR engine) to enable full-text keyword searches and coded to capture specific and predefined metadata (e.g., author, date, and number of copies). These images are loaded onto a discovery software platform that legal counsel uses to review, collaborate, and manage the evidence. The market for legal discovery therefore includes the use of information technology to manage both physical and electronically generated information and records, taking into account the unique requirements on the access, retention, and integrity of electronically generated information IDC #

8 T h e L e g a l D i s c o v e r y I n f r a s t r u c t u r e C o m p e t i t i v e M a r k e t Legal discovery infrastructure is a segment of the information management GRC market. It focuses on the capture, management, retention, and disposition of data so that business organizations can demonstrate legally defensible records retention, preservation, and collection practices. Technology solutions are employed by corporate litigants to document and manage the ediscovery business protocols, manage the disposition and retention of potentially relevant ESI in a legally defensible manner, contain information mismanagement risks, and provide the corporate litigants and legal counsels with the information they require to craft and execute their legal strategy. IDC's legal discovery infrastructure taxonomy is based on the electronic discovery reference model shown in Figure 2 (for more information on this, see EDRM was made available to the public domain since May 2006 and is intended to provide a common, flexible, and extensible framework for the development, selection, evaluation, and use of electronic discovery products and services. IDC's worldwide legal discovery infrastructure research does not include the solutions and technologies that enable the presentation phase. F I G U R E 2 E l e c t r o n i c D i s c o v e r y R e f e r e n c e M o d e l Source: EDRM.net, 2009 The legal discovery process chain involves the critical activities discussed in the sections that follow. 6 # IDC

9 Information Management IDC research sized the digital universe at 281 billion gigabytes as of 2007 and close to 487 billion gigabytes in The 2009 Digital Universe Study forecasts that the size of the digital universe will double every 18 months. The explosion of digital cameras, televisions, surveillance, sensor-based applications (such as GPS), datacenters supporting cloud computing, and social networks account for this projected growth. The study concludes that the amount of information that are "compliance intensive" will grow from 25% of the digital universe in 2008 to 35% of the digital universe in Corporations have the obligation to define and consistently enforce legally defensible protocols for the capture, retention, management, and disposition of compliance-intensive data. IDC also forecasts "security intensive" data will grow from 35% of the total information created today to roughly 45% of the digital universe by the end of Many organizations particularly large enterprises have information and storage infrastructures that are complex and highly distributed. Corporations, many of which go through mergers, acquisitions, and divestitures, have multiple layers of technology silos. IDC research in the past three years also concludes that many organizations continue to have immature corporate information management and litigation preparation readiness programs. Add to these factors today's economic climate, which translates into tight corporate budgets. There is a lot of ambiguity on the timing between the time a "duty to preserve" exists and the date when the suit is filed. For example, in Philip M. Adams & Associates LLC v. Dell Inc. (2009 WL910801), ASUS (Taiwanese computer board manufacturers involved in a patent infringement case) was sanctioned by the courts for spoliation for failure to implement a litigation hold and preserve in 1999, eight years before the actual suit was filed. The volume of potentially relevant ESI could balloon between the time when a duty to preserve exists and the actual date when the suit is filed. The fear of court sanctions from spoliation combined with the lack of visibility into the universe of ESI is driving many legal counsels to err on the side of overpreservation. Once a suit is filed, corporate litigants and their legal counsel have from 100 to 120 days to determine the exposure, gauge the merits of the suit, conduct the "meet and confer," and present a discovery schedule to the courts. The activities and negotiations can be very daunting and fraught with risk and uncertainty if the corporate litigant does not have sound protocols for information management and ESI preservation and collection. A corporation's information management practice functions as one of its first line of defense during a litigation event. The key activities include: Creating file plans and documenting policies for the identification, classification, definition, disposition, and destruction of records and nonrecords (duplicates, convenience copies, version control) of both physical and electronically stored information Developing and documenting policies and practices for scheduled deletion/destruction on nonrecords Developing and documenting policies and practices for suspending routine destruction practices when a duty to preserve arises 2009 IDC #

10 Developing and documenting policies and practices for terminating the suspension of routine destruction programs (i.e., releasing the hold) Collaborating with storage and IT operations team to develop storage plans Enabling federated retention management across multiple content repositories Collaborating with information security team to align classification scheme and corporate records taxonomies with information security classification schema, and developing acceptable use and communications policies and technical procedures Developing an ediscovery response plan and identifying core response team Developing, communicating, training, and reinforcing the corporate retention program Documenting protocols for handling exceptions and localization requirements relative to the corporate global information retention guidelines Identification, Preservation, and Collection These activities can be done by the corporations within their datacenters and corporate networks or in conjunction with professional service partners and managed service partners, or a combination of both internal and partner-led solutions. Increasingly, serial-litigant companies are investing to build repeatable business processes and technical capabilities for managing electronically stored information during these phases. Identification EDRM refers to identification as the process of learning the location of all data that the litigant may have a duty to preserve and potentially disclose in a pending or prospective legal proceeding. The process involves identifying the relevant custodians and creating an information map with the location of potentially responsive material across the entire information infrastructure, including files residing in network file shares, removable hard drives, employee laptops and desktops, and even information stored offsite. The activities in the identification phase are useful in determining the scope of the legal discovery and prepare the producing party to prepare for the meet and confer and eventual discovery conference. Key activities during the identification phase include: Determine the breadth, scope, and depth of ESI that might be pursued during a potential discovery. Conduct internal investigation. Develop and document guidelines on key activities/checklist once a duty to preserve is determined by legal counsel. Document the legal holds creation and notification process, define the workflows for tracking the corporations' legal holds notification and management process, 8 # IDC

11 send alerts when action is required, and create and manage the legal hold termination process. Preservation Preservation refers to the actions an organization performs when its legal counsel has determined that a duty to preserve exists. Once the litigant and its legal counsel have determined the potentially responsive materials and their associated owners or custodians, the first step in the collection process is to preserve the data. The resulting file is referred to as the corpus. The protracted timeline between the events that triggered a duty to preserve potential evidence and the actual date when a lawsuit is filed in court means that massive volumes of potentially responsive data can accumulate in the interim. This situation is further exacerbated by the need to preserve potentially responsive information in multiple global locations, platforms, and formats. Preservation can be particularly taxing for storage and IT operations budgets. Legal counsels and legal technology operations could also face management issues from multiple and multijurisdictional litigation holds. Overpreservation of potentially relevant ESI can lead to overcollection and result in bloated attorney review costs. Litigants and their legal counsel have to balance the need for better precision and efficiency in the entire legal discovery process with the need to reach the "optimal" size for the corpus. Readers should note that the intent of the producing party is to reduce the size of the corpus at each phase of the discovery. During this phase, it is important that legal counsel understands the client's protocols for managing data for legal preservation. It is also important for the corporate litigant to ensure that its IT functions are aware of the chain-of-custody implications of their data management practices for handling ESI. Key activities during the preservation phase include: Ensure potentially relevant ESI is protected from destruction and alternation once legal counsel has determined a duty to preserve. Conduct initial investigations to get better visibility into the merits of the matter and narrow the scope of the preservation. Start preparation of case data and analysis for the meet and confer. Create and manage a centralized repository for custodian responses and status reports as well as the policy creation and administration related to records retention and legal hold. Capture and manage potentially responsive ESI for preservation, collection, paring, review, and production. Facilitate the protocols for the search of potentially responsive ESI across multiple repositories. Collection The collection phase is performed by the corporation on ESI, which has been marked as potentially responsive in the identification phase and preserved and is intended to be reviewed before production to opposing parties. Litigants are required to ensure that the information is collected in a manner that is comprehensive, maintains its 2009 IDC #

12 content integrity, and preserves its form. In many instances, metadata may also need to be collected and maintained to demonstrate chain of custody. The courts and litigants also presume that responsive evidence can be produced and reviewed in native file format. Key activities in the collection phase include: Develop legally defensible processes and activities for gathering potentially responsive ESI, upon an order/request to produce. Create a forensic duplicate of potentially relevant/responsive data to prevent loss and establish a full chain of custody. Computer forensics (which involves the restoration of tapes; files; and encrypted, compressed, and password-protected data) may be invoked to locate and collect lost and deleted electronically stored information. The collection of physical records would have litigants collecting the documents from their storage site (e.g., cabinet files and offsite storage in microfiche/paperbased formats) and making copies or scanning the relevant documents to Tagged Image File Format (TIFF), a widely supported file format for storing bitmapped images on personal computers. Consistency, having the ability to make forensically sound copies, and maintaining chain of custody are critical to the preservation and collection process. Processing, Review, and Analysis Processing Depending on the business process domain knowledge of the corporation and on its technical capabilities, paring and processing of the postcollection ESI can be done internally or by a service provider partner (an ediscovery service firm or external counsel). Domain knowledge on the impact of the technology processing on the ESI chain of custody is critical. The decision on where and who manages the ESI and the review and production application is influenced by the domain and technical capabilities of the corporate litigant, the volume and type of ESI that needs to be processed, the complexity and type of the legal matter, and the number of legal teams involved in the case. Key processing activities include: Develop tape restoration and file and document extraction. Because of the persistent nature of digital data, exact duplicates of files can exist in several locations. For example, exact copies of an attachment can be found in the inboxes of everyone on that particular thread's distribution list. The cost of having attorneys review the same attachment several times over can easily balloon. Deduplication identifies and segregates files that are exact duplicates and offers potential savings by significantly reducing the volume of ESI for document review. Deduplication can be applied globally (the entire collection set) or by custodian, depending on the file type and the circumstances of the legal matter. Deduplication protocols are typically discussed by opposing parties during the meet and confer. Deduplication technologies employ metadata 10 # IDC

13 and hashing algorithms (MD5 hash, SHA-1, or SHA-180) to create a unique digital fingerprint of each file, while still ensuring chain of custody. It is important to note that deduplication technologies are not similar to near-duplication technologies. Near-duplication technologies are typically employed in the latter stages of processing and analysis to identify and compare similar but not exact duplicates (such as different versions of a draft or threads). Identify and programmatically segregate time frames, file extensions, file types, and system files, which are deemed as not relevant to the matter. Leverage text analytics and storage technologies to eliminate nonresponsive, duplicate, and irrelevant data. Documentation of key processes is critical to ensure that chain of custody is not broken. Early case assessment (ECA) applications are increasingly employed by corporations and their counsel to enable legal counsel to have better visibility into the narrative, topics, and issues. These ECA tools also help legal counsels identify key players and social relationships across witnesses and get a better understanding of the narrative and merits of the case valuable information for shaping their legal strategy. In some instances, legal counsels employ the ECA tools to determine the keywords they would negotiate on with opposing party during the meet and confer. ECA tools are also employed by counsel to develop its document review assignment strategies. In addition to Boolean and keywordbased searches, ECA tools typically provide concept search, clustering, visualization, and bulk-tagging capabilities. Prepare the corpus for review by converting to TIFF/PDF and load to document repository (which is typically based on a content management platform). Convert ESI to more readily usable formats, although support for native file review is increasingly becoming more popular. Review and Analysis Anecdotal data suggests that serial litigants are looking to rationalize both the number of outside law firms and litigation support service providers. Some serial litigants are also exploring ways to build up their in-house review capabilities. Several are testing pilots of different review applications while still employing the services of outside litigation support service providers for larger, more complex matters. The decision on the IT architecture (where and who) for managing the ESI during review and analysis is a function of the litigation profile of the company, the complexity and type of litigation, the maturity of the corporation's in-house ediscovery capabilities, the volume and type of ESI that needs to be reviewed, and the number of legal teams involved in the case. Depending on these aforementioned attributes, a corporation may choose to conduct the first-level review (relevance review) internally, or it may choose to use a litigation support service provider. In matters where subsequent levels of review (for privilege, language, etc.) are required, the ability of the review application to support the associated workflows is critical. Disjointed workflows can incur additional costs from having to transfer content to other tools to facilitate key activities (Bates numbering, creating TIFFs for redaction, etc.). Key activities include: 2009 IDC #

14 Legal team conducts the second phase of review reviewing documents for privilege and relevance, and redacting privileged, confidential info. Legal team evaluates ESI to determine such information as key topics, important people, specific vocabulary and jargon, and important individual documents. Legal team negotiates with opposing counsel on the form of production (native, TIFF, etc.) and delivery media (CD, FTP site, etc.) and, upon agreement, transfers production set to appropriate media. Legal technology operations work on the configuration of the ESI and related data for loading into specific software packages (for analysis by opposing party). Producing party (the corporate litigant) would facilitate secure delivery of production set to the relevant parties (opposing counsel, partner firms, outside counsel, and government agencies). Production In this phase, the final set of responsive materials is produced in the appropriate media and delivered to the relevant parties (such as a regulatory agency for audits, opposing parties' legal counsel, partner firms, and outside legal counsel) for outside review. Rule 26(f) of the 2006 amendments to the Federal Rules of Civil Procedure for ediscovery requires opposing parties to negotiate and agree on the format of production early on in the case. The agreements entered into by both parties on the production of ESI during the meet and confer impact the litigants' review strategy, project management, and the choice of ECA tools and document review and production platform applications. As mentioned in the prior section, applications that support an integrated workflow throughout review, analysis, and production can provide processing costs savings. Increasingly, there is a preference among requesting parties that the producing parties support both TIFF-based and native file production. Litigation support vendors continue to invest in their datacenter infrastructure and deliver more flexible review platforms. Digital rights management and encryption technologies are also being utilized in the production phase to expire the ESI (after the matter is closed). The use of these content security applications ensures that the litigant's records management and information retention practices will continue to be enforced, even when a file goes outside the control of its datacenter infrastructure. When ESI is identified as responsive in multiple matters, corporations and service providers invest in functionalities that would facilitate the secure reuse of work products (when appropriate). 12 # IDC

15 T h e L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, As shown in Figure 3, the process for legal discovery is not accomplished by one functional application. The complex and distributed nature of most companies' information management and storage infrastructure makes it challenging to rely on one particular application and service alone. Archiving, search and discovery, forensics/incident management, records management, and content management are core applications to managing the ESI and documenting the workflows throughout the litigation life cycle. Managing ESI for legal discovery also impacts the corporation's disaster recovery, business continuity, acceptable use and communications, and data privacy objectives. Legal discovery requirements therefore influence spending on storage and security services and hardware. All of these components define the legal discovery infrastructure competitive market. Table 1 illustrates the hardware, software, and services functional market components that make up the legal discovery infrastructure competitive market. F I G U R E 3 I D C ' s L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Source: IDC, IDC #

16 T A B L E 1 I D C ' s L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Legal Discovery and Litigation Support Value Chain Product Groups Functional Markets and Comments Information management Content management (including records management and BPM workflow automation) Archiving and HSM ( , file, SharePoint, voice, video, and SAP) Database archiving Imaging/document management Data loss prevention (DLP), content and messaging security File system software Collaborative technologies (SharePoint/Notes) Search and discovery (including search, classification, and indexing) Records retention consulting services (including data discovery and classification) Technology escrow Archiving services Physical records management services Litigation readiness consulting Content migration services Identification, preservation, and collection Data loss prevention, content and messaging security OCR/document conversion Network visualization Forensic software Security incident and event management software Search and discovery (including search, classification, and indexing) Content management (including records management and BPM workflow automation) Archiving and HSM ( , file, SharePoint, voice, video, and SAP) 14 # IDC

17 T A B L E 1 I D C ' s L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Legal Discovery and Litigation Support Value Chain Product Groups Functional Markets and Comments Database archiving Imaging/document management File system software Scanning/copying services Litigation response IT consulting services (including audit, ESI data mapping, and ediscovery IT infrastructure architecture) Discovery response planning Meet-and-confer consulting Computer forensics Bulk data culling Data extraction/tape restoration/content migration services Tape cataloging services Processing, review, and analysis Document conversion software Search and discovery (legal review applications, advanced search and discovery technologies) Content management Content management (including records management and BPM workflow automation) Forensic software TIFF conversion Hosted litigation support services Project management Production Document conversion software Imaging applications Encryption Digital rights management Blowback/copy (print)/tiff production Hosting (production data) 2009 IDC #

18 T A B L E 1 I D C ' s L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Legal Discovery and Litigation Support Value Chain Product Groups Functional Markets and Comments Project management Quality assurance Chain of custody reporting and expert testimony Horizontal applications and technologies (deployed throughout the entire value chain) Core infrastructure applications, services, and hardware (to support availability, data integrity, and resiliency of data throughout the EDRM life cycle) Data protection and recovery software Storage device management software Storage infrastructure software Storage management software Storage replication software Case management software Project management software Vendor management apps software Data integration and access software Enterprise portals software Identity and access management (IAM) software Encryption software File system software New RDBMS New Nonrelational DBMS New IT security infrastructure services New Legal discovery project management services ediscovery and litigation support services Storage infrastructure services New 16 # IDC

19 T A B L E 1 I D C ' s L e g a l D i s c o v e r y I n f r a s t r u c t u r e T a x o n o m y, Legal Discovery and Litigation Support Value Chain Product Groups Functional Markets and Comments IT infrastructure services New Hardware Hardware Hardware Hardware Hardware Security appliance (content filtering, hardware-based encryption) Storage (HDD) Storage systems Tape drive Tape automation Source: IDC, 2009 F U T U R E O U T L O O K The IDC legal discovery infrastructure competitive market taxonomy is updated annually to reflect the changes in the dynamics and use cases. Corporations are taking steps to: Develop repeatable processes for managing communications and workflows for responding to a litigation hold Develop repeatable technical protocols for managing ESI to fulfill their legal hold obligations Employ corporate investments in content management, search and discovery, and archiving solutions to support the technical processes for the information management, identification, preservation, and collection phases of legal discovery Also, emerging technologies and service delivery models continue to disrupt the services segment, resulting in upward adjustments to the ediscovery services, as well as the contribution from the IT storage, IT security, and IT infrastructure services segment. Corporate retention and preservation efforts impacted the corporation's business continuity, disaster recovery, and data privacy requirements. These requirements were not originally incorporated in the prior period's competitive market models. As a result of the changes in the assumption, the revenue contribution from storage services and security services was included in the updated taxonomy and competitive market models IDC #

20 E S S E N T I A L G U I D A N C E The 2009 IDC legal discovery infrastructure taxonomy should be used by readers as a guide to understanding how IDC approaches the legal discovery infrastructure competitive market, including the market size, forecasts, and competitive analysis studies. This document should be read in conjunction with the following documents: Worldwide Compliance Infrastructure Forecast (forthcoming) Worldwide Legal Discovery Infrastructure Forecast (IDC #218259, May 2009) IDC's Worldwide Compliance Infrastructure Taxonomy, 2009 (IDC #217572, March 2009) L E A R N M O R E R e l a t e d R e s e a r c h Worldwide Legal Discovery Infrastructure Forecast (IDC #218259, May 2009) IDC's Worldwide Compliance Infrastructure Taxonomy, 2009 (IDC #217572, March 2009) IDC's Worldwide Legal Discovery and Litigation Support Infrastructure Taxonomy, 2007 (IDC #207162, June 2007) S y n o p s i s This IDC study provides an overview of the research methodology, definitions, and segmentation of the legal discovery infrastructure competitive market. "IDC renamed the legal discovery and litigation support infrastructure market to the legal discovery infrastructure market. Spending in legal discovery infrastructure solutions can be grouped into the following categories: litigation hold automation and life-cycle management; ESI management for investigation, identification, preservation, and collection; postcollection processing and analysis (including early case assessment); and document review and production. Vendors need to be able to support a flexible architecture for managing ESI for pre- and postcollection ediscovery activities," says Vivian Tero, program manager, Compliance Infrastructure, IDC. 18 # IDC

21 C o p y r i g h t N o t i c e This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit Please contact the IDC Hotline at , ext (or ) or sales@idc.com for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2009 IDC. Reproduction is forbidden unless authorized. All rights reserved IDC #

As IDC looks back on ediscovery corporate technology priorities among the highly litigated industries in 2009, the following takeaways emerge:

As IDC looks back on ediscovery corporate technology priorities among the highly litigated industries in 2009, the following takeaways emerge: C U S T O M E R N E E D S A N D S T R A T E G I E S e D i s c o v e r y P r i o r i t i e s A m o n g C o r p o r a t i o n s f r o m H i g h l y R e g u l a t e d a n d L i t i g a t e d I n d u s t r

More information

A United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint

A United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint BUYER CASE STUDY A United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint Vivian Tero IDC OPINION Global Headquarters: 5 Speen Street

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T I D C M a r k e t S c a p e : W o r l d w i d e S t a n d a l o n e E a r l y C a s

More information

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010 W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

Understanding How Service Providers Charge for ediscovery Services

Understanding How Service Providers Charge for ediscovery Services ediscovery SERVICES Understanding How Service Providers Charge for ediscovery Services The objective of this document is to briefly define the prominent phases of the ediscovery lifecycle, the fees associated

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

FEDERAL PRACTICE. In some jurisdictions, understanding the December 1, 2006 Amendments to the Federal Rules of Civil Procedure is only the first step.

FEDERAL PRACTICE. In some jurisdictions, understanding the December 1, 2006 Amendments to the Federal Rules of Civil Procedure is only the first step. A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! VOL. 7, NO. 11 232-235 REPORT NOVEMBER 1, 2007 Reproduced with permission from Digital Discovery & e-evidence, Vol. 7, No. 11, 11/01/2007, pp. 232-235. Copyright

More information

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013 MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??

More information

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director Background Olivia Gerroll, ediscovery Solutions Group Director Over sixteen years of experience in litigation

More information

APPENDIX B TO REQUEST FOR PROPOSALS

APPENDIX B TO REQUEST FOR PROPOSALS Overview and Instructions APPENDIX B The service provider s responsibilities will include the following: (A) Processing of ESI produced to CTAG in a variety of file formats; (B) Hosting ESI produced to

More information

Electronic Discovery. Answers to life s enduring questions

Electronic Discovery. Answers to life s enduring questions Electronic Discovery Answers to life s enduring questions 1 Electronic Discovery 1. Requirements: What do courts expect? 2. Potential consequences of missteps? Sanctions and unnecessary expense 3. Solutions:

More information

www.salixdata.com 513-381-2679

www.salixdata.com 513-381-2679 Electronic Discovery Presented by: Jonathan Adams www.salixdata.com 513-381-2679 Our Goal Explain E-Discovery in layman s terms Equip you to be able to add value to your organization SALIX is the region

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

for Insurance Claims Professionals

for Insurance Claims Professionals A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to

More information

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Developed by Orange Legal Technologies, Providers of the OneO Discovery Platform. Considering Third Generation

More information

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and

More information

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

A Radicati Group Webconference

A Radicati Group Webconference The Radicati Group, Inc. www.radicati.com A Radicati Group Webconference 9:30 am, PT November 3, 2011 The Radicati Group, Inc. Copyright November 2011, Reproduction Prohibited The Radicati Group, Inc.

More information

Best Practices: Defensibly Collecting, Reviewing, and Producing Email

Best Practices: Defensibly Collecting, Reviewing, and Producing Email Best Practices: Defensibly Collecting, Reviewing, and Producing Email October 9, 2014 Karsten Weber Principal, Lexbe LC ediscovery Webinar Series Info & Future Takes Place Monthly Cover a Variety of Relevant

More information

ediscovery Solutions

ediscovery Solutions The Radicati Group, Inc. www.radicati.com ediscovery Solutions A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright November 2010, Reproduction Prohibited 9:30 am, PT November 4, 2010

More information

Autonomy Consolidated Archive

Autonomy Consolidated Archive Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain

More information

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments Andres De Aguero, Senior Lead, Deloitte Consulting LLP David F. Axelrod, Director, Deloitte

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011 E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.

More information

ILM et Archivage Les solutions IBM

ILM et Archivage Les solutions IBM Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance

More information

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide

More information

Symantec ediscovery Platform, powered by Clearwell

Symantec ediscovery Platform, powered by Clearwell Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow

More information

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Litigation Support. Learn How to Talk the Talk. solutions. Document management Document management solutions Litigation Support glossary of Terms Learn How to Talk the Talk Covering litigation support from A to Z. Designed to help you come up to speed quickly on key terms and concepts,

More information

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS KYLE ALEXANDER, and DYLAN SYMINGTON, on behalf of themselves and all those

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

Veritas ediscovery Platform

Veritas ediscovery Platform TM Veritas ediscovery Platform Overview The is the leading enterprise ediscovery solution that enables enterprises, governments, and law firms to manage legal, regulatory, and investigative matters using

More information

Managing Storage and Compliance Costs through E-mail Archiving and ediscovery

Managing Storage and Compliance Costs through E-mail Archiving and ediscovery Managing Storage and Compliance Costs through E-mail Archiving and ediscovery Gregory P. Kosinski Director, Product Marketing EMC Heidi Maher, Esq. Compliance and ediscovery Advisor EMC Copyright 2009

More information

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks Understanding Today s Economics of Information Get Your Act Together Now! Sylvan Sibito H Morley III IBM Worldwide Director Information Lifecycle Governance Information Economics: The discipline of analyzing

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

E-Discovery in Michigan. Presented by Angela Boufford

E-Discovery in Michigan. Presented by Angela Boufford E-Discovery in Michigan ESI Presented by Angela Boufford DISCLAIMER: This is by no means a comprehensive examination of E-Discovery issues. You will not be an E-Discovery expert after this presentation.

More information

THIS WEBCAST WILL BEGIN SHORTLY

THIS WEBCAST WILL BEGIN SHORTLY If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! THIS WEBCAST WILL BEGIN SHORTLY Cloud-Based vs. On-Premise ediscovery

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com B U Y E R C A S E S T U D Y U. S. B a n k i n g I n s t i t u t i o n I m p l e m e n t s V a r o n i s t o G a i n C o n t r o l o f U n s t r u c t u r e d F i l e S e r v e r D a t a Laura DuBois I

More information

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare 102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,

More information

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure June 11, 2015 Stu Van Dusen Lexbe LC ediscovery Webinar Series Info Future Takes Place Monthly Cover a Variety of Relevant

More information

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint David Tappan SharePoint Consultant C/D/H davidt@cdh.com Twitter @cdhtweetstech Don Miller Vice President of Sales Concept Searching

More information

Integration of E-Discovery and FOIA

Integration of E-Discovery and FOIA Integration of E-Discovery and FOIA April 4, 2013 Tom Kennedy Director, Symantec Archiving and E-Discovery Team Digital Government Institute s E-Discovery, Records & Information Management Conference,

More information

How To Find Out What You Know About Esi

How To Find Out What You Know About Esi Managing the E-Discovery Process: Guidance for Federal Agencies Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Message from the Associate Attorney General Message from Magistrate Judge Paul

More information

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents Amendments to Federal Rules of Civil Procedure Electronic Discovery effective Dec. 1, 2006 Copyright David A. Devine GROH EGGERS, LLC Rules amended: 16, 26, 33, 34, 37 & 45 Sources of information: Rules

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

Developing an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional

Developing an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional Developing an Integrated e-discovery and Corporate Records Management Program Presented by: Janeine Charpiat Information Security Professional What is ediscovery? any process in which electronic data is

More information

How To Manage Risks And Compliance In Virtualized Environments

How To Manage Risks And Compliance In Virtualized Environments Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A c c e l e r a t i n g V a l u e C r e a t i o n a n d E n a b l i n g D y n

More information

A large and rapidly expanding Digital Universe

A large and rapidly expanding Digital Universe Litigation Holds and e Discovery Rules C. Allen Shaffer Bricker & Eckler LLP A large and rapidly expanding Digital Universe SOURCE: IDC, The Diverse and Exploding Digital Universe: An Updated Forecast

More information

Best Practices in Electronic Record Retention

Best Practices in Electronic Record Retention I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Insight DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Stephen Elliot IDC OPINION Based on a research survey conducted during October and November of 2014 across multiple

More information

Symantec Enterprise Vault E-Discovery Connectors

Symantec Enterprise Vault E-Discovery Connectors Symantec Enterprise Vault E-Discovery Connectors Extending chain of custody beyond Enterprise Vault Discovery Accelerator Overview Symantec Enterprise Vault Discovery Accelerator extends the basic search

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 1 The E-Discovery How-To Guide: Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 2 Table

More information

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in

More information

Information Governance in the Cloud

Information Governance in the Cloud Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and

More information

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network. TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery

More information

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014 Best Practices: Litigation Document Management Applying The Latest Lexbe ediscovery Platform Features and Functionality for Fast and Collaborative Reviews and Productions September 18, 2014 Stu Van Dusen

More information

What You Should Know About ediscovery

What You Should Know About ediscovery KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the

More information

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology Digital Government Institute Managing E-Discovery for Government: Integrating Teams and Technology Larry Creech Program Manager Information Catalog Program Corporate Information Security Information Technology

More information

Reducing the Cost of ediscovery in Today s Economic Climate. risk of ediscovery

Reducing the Cost of ediscovery in Today s Economic Climate. risk of ediscovery Reducing the Cost of ediscovery in Today s Economic Climate Strategies for reducing the cost and Strategies for reducing the cost and risk of ediscovery The 2009 Corporate ediscovery Challenge Corporate

More information

Discovery Data Management

Discovery Data Management Discovery Data Management in Practice Introductions Reveal Derick Roselli 949-280-3519 droselli@revealdata.com www.revealdata.com Program Outline Pre-Planning Stages Workflow Management Project Management

More information

EMC SourceOne Email Management and ediscovery Overview

EMC SourceOne Email Management and ediscovery Overview EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email

More information

ARCHIVING FOR EXCHANGE 2013

ARCHIVING FOR EXCHANGE 2013 White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver

More information

Information Archiving

Information Archiving Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive

More information

What Am I Looking At? Andy Kass

What Am I Looking At? Andy Kass Concordance Tip Sheet August 2013 What Am I Looking At? Andy Kass Discovery is the process of requesting, producing and gleaning documents to substantiate assertions of fact in a case. Review is a deep,

More information

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including

More information

How To Understand Cloud Economics

How To Understand Cloud Economics WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization

More information

An Overview of etera Consulting Europe and Our In Country Capabilities

An Overview of etera Consulting Europe and Our In Country Capabilities An Overview of etera Consulting Europe and Our In Country Capabilities Table of Contents etera Europe... 3 An Overview Of etera Europe Locations And In Country. Capabilities... 3 Data Collection... 3 Data

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

IDC MarketScape: Worldwide Business Consulting Strategy for Digital Operations 2015 Vendor Assessment

IDC MarketScape: Worldwide Business Consulting Strategy for Digital Operations 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Business Consulting Strategy for Digital Operations 2015 Vendor Assessment Michael Versace Cushing Anderson THIS IDC MARKETSCAPE EXCERPT FEATURES KPMG IDC MARKETSCAPE

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover : Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big

More information

Electronic Discovery How can I be prepared? September 2010

Electronic Discovery How can I be prepared? September 2010 Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com SURVEY Impact of Training: Functional Excellence Leads to Operational Productivity Cushing Anderson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS NE X TPOINT.C O M @NE X TPOINT Aided by the sensible use of technology, small firms should no longer be averse to taking on big cases or processing

More information

It s All About the Deadline:

It s All About the Deadline: White Paper It s All About the Deadline: Overcoming the four key challenges of ediscovery to help control attorney review costs. Ken Reiff Vice President, Business Development Xerox Litigation Services

More information

The Future of Information

The Future of Information Place image here The Future of Information Management Bill Tolson Iron Mountain In the face of an ongoing electronic information explosion, information management becomes an imperative. Organizations need

More information

White. Paper. How Archiving Reduces the Cost and Complexity of Reactive ediscovery. April 2010

White. Paper. How Archiving Reduces the Cost and Complexity of Reactive ediscovery. April 2010 White Paper How Archiving Reduces the Cost and Complexity of Reactive ediscovery By Brian Babineau April 2010 This ESG White Paper was commissioned by Symantec and is distributed under license from ESG.

More information

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Brought to you by: ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Introduction: Rising costs of litigation The chance of your organization

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T I D C M a r k e t S c a p e : U. S. B u s i n e s s C o n s u l t i n g S e r v i c

More information