E-Discovery Management in the Age of Big Data

Size: px
Start display at page:

Download "E-Discovery Management in the Age of Big Data"

Transcription

1 E-Discovery Management in the Age of Big Data Effective e-discovery can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era. CLASSIFICATION VITAL TO BIG DATA CLOUD- BASED

2 EDITOR S NOTE Big Data Forces New Look at E-Discovery Management and Processes TO BIG DATA The amount of data the typical modern organization generates and is responsible for maintaining for legal and regulatory compliance is astounding. As the big data age continues, many businesses have to completely rework information management strategies to adapt, and e-discovery processes are no exception. The trouble is that the vast majority of stored data is never needed for litigation purposes, making discovery of relevant legal data seem like finding an (expensive) needle in a haystack. As businesses try to ensure their information systems and processes can produce relevant legal information, it puts a strain on resources and drives up costs. Throw third parties such as cloud storage providers into the mix, and big data management processes and e-discovery become even more complicated. In this SearchCompliance handbook, we ll guide you through the development of mature information management processes and e-discovery best practices. In our first article, we look at how information classification is the essential first step to e-discovery in the age of big data. In our second piece, we discuss the data management policy must-haves to ensure effective e-discovery if information is needed for litigation purposes. And in our final article, information governance expert Jeffrey Ritter provides key strategies to ensure cloud provider contract agreements meet the organization s e-discovery management and legal requirements. We hope you find this handbook useful as your business seeks the best e-discovery policies that reduce legal and regulatory risk in the face of big data. n Ben Cole Editor, SearchCompliance 2 MANAGEMENT IN THE AGE OF BIG DATA

3 DATA MANAGEMENT Information Classification Vital to Big Data E-Discovery TO BIG DATA Big data takes many forms, with the umbrella term used to describe vital business information stemming from applications, security logs and business productivity documents, to name a few. Then, of course, is the unmanaged, or unstructured, data not stored in a database which is headache-inducing if the information must be located for a compliance audit or lawsuit. When it comes to aging data, 50% of respondents to a 2013 Gartner Inc. survey responded that understanding exactly what specific data is used for and what information should be discarded is the No. 1 issue with which their organization struggles. From an information governance perspective, big data challenges stem primarily from not knowing what data to keep, said Gartner Inc. Research Director Garth Landers. This is increasingly hard given that these big data analytics opportunities may not be readily evident, Landers said during a presentation at the 2014 Gartner Security and Risk Management Summit. For those of us in IT, there is a lack of understanding, a fear of what to do with that data. This trepidation makes data classification and what to do with that newly defined information vital when it comes time to identify and recover that data if it s needed for litigation. After all, if you don t know exactly what the data is, how will you know how to properly store and recover it? Having a rock-solid structured data archiving process is a great place to start. It is now common for organizations to generate and manage petabytes or even exabytes of data. As a result, organizations are moving away from storing data indefinitely and toward identifying any information that can be deleted, Landers said. If you store everything, it s more likely to come up in pending litigations or regulatory 3 MANAGEMENT IN THE AGE OF BIG DATA

4 DATA MANAGEMENT TO BIG DATA compliance audits, Landers said. If data has no business value, get rid of it. Classification is vital to this process starting with simply defining what a record is as it pertains to your organization, said John Isaza, who leads the information governance and records management practice at law firm Rimon PC. Once you have that definition of a record, then you can dispose of information that is not a record, except of course if there is a legal hold in place, Isaza said. Companies need to strike a delicate balance, however: Keeping too much information can create legal complications, but the organization also must be prepared in the event that relevant information is called upon as part of an e-discovery request. To prevent over-retention, you have to, first and foremost, have a records retention schedule that dictates what you absolutely need to keep as a matter of best business practices and to remain fully compliant with regulations, Isaza said. If the organization has adequate resources, Isaza suggests having a legal hold steering committee in place to oversee anticipated or pending litigation. The committee would be responsible for identifying legally relevant data to prevent the destruction of not just records, but of all data in your systems that could be relevant to the subject matter of that lawsuit or investigation, Isaza said. USE BIG DATA MAPPING TO YOUR ADVANTAGE If implemented correctly, these information classification and big data e-discovery processes can help reduce litigation costs and risk. But where should organizations start? One proactive solution is to develop your organization s data map, said Marshall Hoel, a managing consultant at Berkeley Research Group LLC. The data map is a comprehensive listing of the systems employed by a business, their functions, how they store data, how often they are backed up, and which other systems deal with similar data and how they interact, Hoel said. This information will be invaluable if specific data must be located quickly to fulfill a legal obligation. Data maps can help the IT team communicate with legal counsel about how the 4 MANAGEMENT IN THE AGE OF BIG DATA

5 DATA MANAGEMENT TO BIG DATA record is classified, its location and the retention policies for it. It s also important to know the key players who are involved in the day-to-day management of the various systems, Hoel said. It will be critical to interact well with these individuals when the time comes to act in the face of impending litigation. Thorough data classification and mapping techniques have become necessary as organizations adapt to the demands of big data, as well as its associated storage costs. In the past, businesses that dealt with large amounts of structured and unstructured data would do so using relational database management systems tailored to the various applications. Under these systems, the data being analyzed was stored in a logical, easily identified location so that information management policies could be readily applied, Hoel said. Big data has dramatically changed these processes, he added. When confronted with the problem of legal preservation and discovery, businesses are forced to rethink their strategies regarding structured and unstructured data and traditional collection techniques, Hoel said. Ben Cole 5 MANAGEMENT IN THE AGE OF BIG DATA

6 POLICY KNOW-HOW The Role of Strict Data Management Policy in E-Discovery TO BIG DATA Big data complicates numerous aspects of data management. Questions around information access, security controls and data retention and deletion schedules all become more pressing when there is a seemingly endless amount of data to sift through. Without a thorough data management policy, it s also very difficult to access relevant e-discovery data during a court case. And even the organizations that do have a policy in place often don t take into account the complexity of big data, said Garth Landers, a research director at Gartner Inc. These policies have not largely been adopted and applied to big data, or activated data that may sit in depositories like Hadoop and data warehouses, Landers said during a presentation at the 2014 Gartner Security and Risk Management Summit. Access enablement and control become increasingly important. Of course, information governance policy development is no picnic in the big data era. Every crucial aspect of the organization finance, security, IT, etc. will have its own data-related governance, risk and compliance and legal mandates. Determining exactly what data needs to be kept and for how long will become convoluted quickly when all of these departments provide input. When developing an information governance policy, a key aspect is to identify the crucial areas that drive data retention, such as regulatory compliance mandates and potential legal issues, Landers said. There must be organization-wide communication, cooperation and cross-training about information governance responsibilities. Representatives from the legal, IT and compliance departments should also be able to refine the processes when the regulatory landscape inevitably changes. You want to have those rules and policies 6 MANAGEMENT IN THE AGE OF BIG DATA

7 POLICY KNOW-HOW TO BIG DATA come from the people that know the people that understand the regulation, the people that understand the legal requirements of the organization, that are involved in litigation, Landers said. Of course, strategic information management programs should also decrease e-discovery challenges while helping lower storage costs and mitigate risks. The plan should take into account the nature of the impending litigation, the people involved, the systems in play, and the processes needed to respond to the discovery request in a timely and cost-effective manner, said Marshall Hoel, a managing consultant at Berkeley Research Group LLC. Too often, organizations are caught flatfooted by a discovery or other legal request, and this usually leads to significant strain on resources and costs, Hoel said. Proactive management of these issues is the most effective way to mitigate both cost and risk. THIRD-PARTY (BIG) As big data continues to complicate information governance, organizations are increasingly turning to third parties to help. Tools that help manage unstructured data can be invaluable to ensure legal and regulatory compliance, for example. Predictive coding solutions have also become necessary to help scan millions of documents for legal proceedings. It s important to remember that information governance policy doesn t end at the company doors. For third-party vendors, we are encouraging our clients to have contractual provisions to obligate them to follow your records management procedures and follow your needs as an organization when it comes to e-discovery, said John Isaza, who leads the information governance and records management practice at law firm Rimon PC. Companies also should take into account the potential for lag time for requests to cull data from third-party systems, Hoel said, and factor that into their vendor information management strategy to avoid missing e-discovery deadlines. He suggests conducting periodic testing that extracts small amounts of data with random identification parameters. 7 MANAGEMENT IN THE AGE OF BIG DATA

8 POLICY KNOW-HOW TO BIG DATA This will give you a good idea of how to respond and work with your providers when it comes time to respond to an actual discovery request, Hoel said. Mobile data creates another information management hurdle. As organizations increasingly allow employees to create and store company data on personal mobile devices, companies must establish guidelines that clearly depict what types of data are allowed on these devices. Any location where electronically stored information (ESI) exists whether in the cloud or on social media or mobile devices could be culled for litigation, Hoel said. Companies have to remain vigilant and take into account vendors business strategy as well, especially when it comes to discovering legal data. In many cases, third-party data management and storage providers pool their clients data into massive data sets to make the technology more efficient. While this is a great way to reduce upfront costs, it can present an additional hurdle when it comes to the process of preservation and collection of potentially relevant ESI, Hoel said. Companies have to remain vigilant and take into account vendors business strategy as well, especially when it comes to discovering legal data. This adds to the importance of consistent, documented processes that are regularly audited. Companies seem to be paying attention: Gartner predicts that by 2018, 25% of progressive organizations will manage their unstructured data using information governance and storage management policies, up from less than 1% today. But of course, just having policy isn t enough. When we talk about organizations being prepared and responding to events like audits, investigations and litigation, it s not just about having a policy, Landers said. It s about executing it, being consistent, and making sure that it s demonstrable to litigators, auditors or any regulatory body that makes an inquiry. Ben Cole 8 MANAGEMENT IN THE AGE OF BIG DATA

9 GOVERNANCE Five Strategies for Managing Cloud-Based E-Discovery TO BIG DATA As data volumes increase, so does the complexity of searching for, collecting, processing and producing potentially relevant evidence required for internal investigations, civil litigation, compliance filings and enforcement proceedings. To manage this complexity, a new generation of cloud-based e-discovery products and services has emerged. Here are five key contract agreements to ensure that cloud providers meet your e-discovery management and information governance requirements. STRATEGY #1: USE THE CLOUD IN BUSINESS CAREFULLY A provider may license software applications to be accessed and used on its systems, including the processing and storage of related digital information (software as a service, or SaaS). The provider may also lease the use of its systems, servers and infrastructure, whether for general computing purposes (infrastructure as a service, or IaaS) or for building and launching various types of software applications (platform as a service, or PaaS). In any of these three service models, the service contract is very important to the future performance of e-discovery management, as well as to the ability to meet legal requests and deadlines for information. The Federal Rules of Civil Procedure impose discovery obligations (including those for electronically stored information, or ESI) with respect to information that is within a company s possession, custody or control. Courts regularly conclude that cloud-based data is still within a company s or the cloud customer s control. But unless the customer has clearly defined a service provider s duties and services with respect to cloud-stored data in the provider s custody, significant costs and administrative 9 MANAGEMENT IN THE AGE OF BIG DATA

10 GOVERNANCE TO BIG DATA challenges emerge. A 2013 Symantec survey reported two-thirds of the responding companies with cloud-based storage had missed legal deadlines for delivering the requested information. Therefore, customers should anticipate that any digital information stored with a cloud provider may be required as potential evidence in legal proceedings. The contract agreement, as well as internal corporate procedures, should anticipate how e-discovery will be performed against the data, and the respective duties (and costs) of the provider to do so. STRATEGY #2: GOVERN YOUR ESI Beyond the direct service agreement, cloud customers (and law firms with respect to their own business records, as well as their clients) should include cloud-based ESI in the design and management of their information governance programs. Information governance is far more than just records management. It involves applying all of the rules applicable to business data at any location at which the data may be collected, processed or stored. It is astounding the number of companies that have yet to revise their 20th century records management practices to fully embrace 21st century digital realities. Customers should anticipate that any digital information stored with a provider may be required as evidence. Effective information governance means a company is also anticipating the impact of collecting, processing or storing ESI with cloud providers under various legal duties unrelated to e-discovery management. Privacy and data protection, information security, data transfers and destruction rules all must also be navigated when e-discovery is conducted in the cloud. A business must both build a complete inventory of those rules, including the e-discovery rules to which the company may be subject, and assure those rules can be and are being enforced against all of the company s data assets. In fact, without that foundation, 10 MANAGEMENT IN THE AGE OF BIG DATA

11 GOVERNANCE any service agreement with a cloud provider will likely fail to support the company s future e-discovery needs. requires the provider to develop and deliver operating logs and similar records that demonstrate performance and log-relevant events. TO BIG DATA STRATEGY #3: ENGAGE CLOUD SERVICES WITH PRECISION As part of a company s information governance program, rules describing e-discovery processes and their application to all of a company s ESI should be in place before engaging cloud-based products and services. Those rules then become the basis by which detailed statements of work can be composed and included in the related agreements. Doing so is a dramatic step toward minimizing the potential for data management chasms between the customer and the providers, particularly when operating under court-imposed deadlines. Whether using a provider to store ESI for later processing in discovery, or for licensing the use of advanced e-discovery software for filtering and reviewing ESI, companies still will want to ensure their internal controls are being properly implemented for the data assets in the provider s custody. That assurance often STRATEGY #4: PROTECT THE CHAIN OF CUSTODY FOR ESI If a company (and its lawyers) cannot show the digital chain of custody through which the ESI has passed, when offered to the court, opposing counsel may successfully argue the ESI is not worth the paper on which it may be printed. Therefore, customers should choose providers that properly design and carefully control ESI management processes. Once the ESI is under the custody of the provider (e.g., at the moment of collection from the desktop machine of an employee or a backup server archive), the providers often have superior chain of custody processes. After all, protecting the integrity of the ESI as evidence is their fulltime job. It is not merely an incidental task, as is often the case in corporate departments and divisions who crowd information governance onto an often too-filled plate of other business duties. 11 MANAGEMENT IN THE AGE OF BIG DATA

12 GOVERNANCE TO BIG DATA The agreements must have documentation of those procedures. As an added safeguard, the agreement must also include stipulations that the cloud service provides for production and delivery of process documentation on specific cases or specific ESI assets. It is not enough to offer the agreement s promises of how the ESI will be managed. What matters is the customer s ability to demonstrate the actual ESI management activities that occurred for a specific data set. Additionally, the customer may want to negotiate the availability of a provider s staff to testify in depositions or in court regarding those activities. STRATEGY #5: TEST THE CAPABILITIES AND PROCEDURES Complex litigation and the potential for sanctions, fines or irreparable adverse rulings imposed for e-discovery negligence are like any other substantive disasters. Careful planning and testing are essential to ensure everything fires correctly when things get hot. Cloud providers should be strong partners with their clients in developing suitable tests of their capabilities to execute the required e-discovery procedures. It isn t enough to offer the agreement s promises of how the ESI will be managed. Based on the contracted services being implemented (SaaS, IaaS or PaaS), these tests will vary in their complexity. But it is important that the documentation of their execution and the results be retained as further evidence of the company s commitment to responsibly execute its e-discovery obligations. The primary agreement should ensure these tests are part of the initial setup and launch of the services, and that recurrent testing occurs. If major services are altered, including in response to changing legal rules, additional testing to ensure conformity with the alterations is always appropriate. Jeffrey Ritter 12 MANAGEMENT IN THE AGE OF BIG DATA

13 ABOUT THE AUTHORS TO BIG DATA BEN COLE is site editor for SearchCompliance. Prior to joining TechTarget, he was the online editor for Health- Leaders Media, based in Marblehead, Mass. He began his journalism career as a reporter with the Massachusetts daily newspapers The Gardner News and the Sentinel and Enterprise. Write to him at bjcole@techtarget.com. JEFFREY RITTER is one of the nation s experts in the converging complexity of information governance, security, the use of digital information as evidence and the emergence of cloud-based services. He advises companies and governments on successful 21st century strategies for managing digital information with legal and business value. He is currently developing and teaching courses on information governance at Johns Hopkins University s Whiting School of Engineering and Georgetown University Law. Write to him at jeffrey@jeffreyritter.com. E-Discovery Management in the Age of Big Data is a SearchCompliance.com e-publication. Rachel Lebeaux Senior Managing Editor Ben Cole Site Editor Fran Sales Associate Site Editor Jeffrey Ritter Contributing Writer Christina Torode Editorial Director Linda Koury Director of Online Design Neva Maniscalco Graphic Designer FOR SALES INQUIRIES Amalie Keerl Director of Product Management akeerl@techtarget.com TechTarget 275 Grove Street, Newton, MA TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or by any means without written permission from the publisher. TechTarget reprints are available through The YGS Group. About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice. At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts. COVER PHOTOGRAPH: TCMAKE/THINKSTOCK 13 MANAGEMENT IN THE AGE OF BIG DATA

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational

More information

Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of

Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of THE WINDOWS MANAGER S GUIDE TO INSIDE: A Concerning the matter heretofore of the party of the first part in the aforementioned case notwithstanding, it can be argued that on a number of occasions over

More information

How To Ensure Cloud Storage Is Safe

How To Ensure Cloud Storage Is Safe STORAGE ASEAN MANAGING THE INFORMATION THAT DRIVES THE ENTERPRISE UNSTRUCTURED DATA Home growth continues to present challenges STORAGE CHOICES storage? Prepare to be confused by the variety of options

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

Using Predictive Coding to Your E-Discovery Advantage

Using Predictive Coding to Your E-Discovery Advantage 1EDITOR S NOTE VIRTUALIZATION CLOUD APPLICATION DEVELOPMENT NETWORKING STORAGE ARCHITECTURE DATA CENTER MANAGEMENT BI APPLICATIONS DISASTER RECOVERY/COMPLIANCE SECURITY Handbook Using to Your Advantage

More information

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Brought to you by: ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Introduction: Rising costs of litigation The chance of your organization

More information

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools. THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Electronic Discovery How can I be prepared? September 2010

Electronic Discovery How can I be prepared? September 2010 Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments Andres De Aguero, Senior Lead, Deloitte Consulting LLP David F. Axelrod, Director, Deloitte

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover : Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to

More information

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER Elements of a Good Document Retention Policy Discovery Services WHITE PAPER Document retention especially the retention of electronic data has become a hot topic in the legal industry. In the wake of several

More information

The Legal Advantages of Retaining Information

The Legal Advantages of Retaining Information WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING Confidence in a connected world. Best Practices for Defining and Establishing Effective Archive Retention Policies Sponsored by Symantec

More information

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services ONE SOLUTION Maximize the Business Value of Your Information Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services In today s world, information whether in paper or digital

More information

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers MARCH 7, 2007 E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers By Tara Daub and Christopher Gegwich News of the recent amendments to the Federal Rules of Civil Procedure

More information

3 "C" Words You Need to Know: Custody - Control - Cloud

3 C Words You Need to Know: Custody - Control - Cloud 3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

The Future of Information

The Future of Information Place image here The Future of Information Management Bill Tolson Iron Mountain In the face of an ongoing electronic information explosion, information management becomes an imperative. Organizations need

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Sponsored by ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Kahn Consulting Inc. (847) 266-0722 info@kahnconsultinginc.com Introduction The following

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing

A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing Shannon Smith, Esq., ediscovery and Archiving Specialist for CommVault Systems Bennett B. Borden,

More information

Understanding ediscovery and Electronically Stored Information (ESI)

Understanding ediscovery and Electronically Stored Information (ESI) Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination

More information

White Paper. The benefits of a cloud-based email archiving service. for use by organisations of any size

White Paper. The benefits of a cloud-based email archiving service. for use by organisations of any size White Paper The benefits of a cloud-based email archiving service A White Paper by Bloor Research Author : Fran Howarth Publish date : June 2010 Given the importance placed today on emails as a means of

More information

Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited

Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited November 17, 2010 Where the Rubber Meets the Road: The Evolution of ESI Discovery Readiness When IT Resources are Limited Wayne Wong, Managing ESI Consultant, Kroll Ontrack Tom McCaffrey, Director of Archiving,

More information

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia

More information

Meeting Changing Information Management Needs with Next-Generation Email Archiving

Meeting Changing Information Management Needs with Next-Generation Email Archiving Whitepaper Sponsored by Written by Info-Tech Research Group Meeting Changing Information Management Needs with Next-Generation Email Archiving Introduction Email archiving is evolving beyond pure storage

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:

More information

From Information Management to Information Governance: The New Paradigm

From Information Management to Information Governance: The New Paradigm From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining

More information

The E-Discovery Process

The E-Discovery Process POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 1 The E-Discovery How-To Guide: Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper the e-discovery how-to Guide page : 2 Table

More information

FDU - Records Retention policy Final.docx

FDU - Records Retention policy Final.docx Records and Information Management Program Policy and Procedure Responsible Office Office of the General Counsel Effective Date 04/01/2012 Responsible Official General Counsel Last Revision I. Rationale

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Miguel Ortiz, Sr. Systems Engineer. Globanet

Miguel Ortiz, Sr. Systems Engineer. Globanet Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely

More information

ediscovery and Information Governance Practice Overview

ediscovery and Information Governance Practice Overview ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.

More information

for Insurance Claims Professionals

for Insurance Claims Professionals A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS Overview. DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS A comprehensive and consistently applied document retention policy is necessary to reduce the risk of being charged with spoliation

More information

Whitepaper: Cloud Computing for Credit Unions

Whitepaper: Cloud Computing for Credit Unions Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...

More information

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare 102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,

More information

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Electronic Record Retention and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Agenda What is all this ediscovery buzz? Email is major focus of ESI Impact of New FRCP rules

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

Information Retention and ediscovery Survey GLOBAL FINDINGS

Information Retention and ediscovery Survey GLOBAL FINDINGS 2011 Information Retention and ediscovery Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: There is more to ediscovery than email... 8 Finding 2: Wide variations in information

More information

WHITE PAPER. Deficiencies in Traditional Information Management

WHITE PAPER. Deficiencies in Traditional Information Management WHITE PAPER Deficiencies in Traditional Information Management Table of Contents 3 Abstract 3 Information Management Defined 7 Problems with Traditional Approaches 8 Conclusion Table of Figures 5 Figure

More information

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE EXECUTIVE SUMMARY Information governance incorporates the policies, controls and information lifecycle management processes organizations and government agencies utilize to control cost and risk. With

More information

Email Management and Litigation Risk Management

Email Management and Litigation Risk Management Email and Litigation Risk Email is one of the most heavily used applications in every enterprise. But it s also an application that, without proper management, can threaten an organization s future. Just

More information

Electronic Records Storage Options and Overview

Electronic Records Storage Options and Overview Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for

More information

Successful ediscovery in a Bring Your Own Device Environment

Successful ediscovery in a Bring Your Own Device Environment IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between

More information

Document Storage Tips: Inside the Email Vault

Document Storage Tips: Inside the Email Vault Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360,

More information

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices How to Manage Costs and Expectations for Successful E-Discovery: Best Practices Mukesh Advani, Esq., Advisory Board Member, UBIC North America, Inc. UBIC North America, Inc. 3 Lagoon Dr., Ste. 180, Redwood

More information

IBM Information Archive for Email, Files and ediscovery

IBM Information Archive for Email, Files and ediscovery IBM Information Archive for Email, Files and ediscovery Simplify and accelerate the implementation of an end-to-end archiving and ediscovery solution Highlights Take control of your content with an integrated,

More information

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Soo Y Kang, IGP, CIPP/US General Counsel / Director, Consulting Division Zasio Enterprises, Inc. March 2015 June 2015 Article

More information

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and

More information

Information Governance in the Cloud

Information Governance in the Cloud Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and

More information

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

Unstructured Data Doubles Every 3 Months

Unstructured Data Doubles Every 3 Months Intelligent Document Management Unstructured Data Doubles Every 3 Months What Is Unstructured Data and Why Is It Important? Most people believe having information in digital format means they can find

More information

The Smart Archive strategy from IBM

The Smart Archive strategy from IBM The Smart Archive strategy from IBM IBM s comprehensive, unified, integrated and information-aware archiving strategy Highlights: A smarter approach to archiving Today, almost all processes and information

More information

Fundamentals of Information Governance:

Fundamentals of Information Governance: Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different

More information

Electronic Discovery: Litigation Holds, Data Preservation and Production

Electronic Discovery: Litigation Holds, Data Preservation and Production Electronic Discovery: Litigation Holds, Data Preservation and Production April 27, 2010 Daniel Munsch, Assistant General Counsel John Lerchey, Coordinator for Incident Response 0 E-Discovery Rules Federal

More information

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies?? 21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30

More information

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS Introduction While electronic documents are included in the definition of document contained

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

DISCOVERING ediscovery

DISCOVERING ediscovery DISCOVERING ediscovery Purpose This paper is the first in a series that are designed to educate organisations and increase awareness in the area of ediscovery technology. What is ediscovery? Electronic

More information

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide

More information

THE PURSUIT OF ELECTRONIC DISCOVERY. co-authored by. Andy D. Birchfield, Jr. 1 & Keith Altman 2

THE PURSUIT OF ELECTRONIC DISCOVERY. co-authored by. Andy D. Birchfield, Jr. 1 & Keith Altman 2 THE PURSUIT OF ELECTRONIC DISCOVERY co-authored by Andy D. Birchfield, Jr. 1 & Keith Altman 2 The pursuit of electronic discovery by lawyers and the legal battles that ensue are now a routine part of pharmaceutical

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Are Mailboxes Enough?

Are Mailboxes Enough? Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day

More information

The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness

The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness This comprehensive survey report reveals how many organizations are still grappling with being prepared

More information

PALANTIR & LAW ENFORCEMENT

PALANTIR & LAW ENFORCEMENT 100 Hamilton Avenue Palo Alto, California 94301 PALANTIR & LAW ENFORCEMENT Protecting Privacy and Civil Liberties TABLE OF CONTENTS Introduction Solution Overview Privacy Protective Technology Enforcing

More information

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY Statement of Intent This policy establishes the general responsibilities for management, retention, and disposition of SOUTHWEST VIRGINIA

More information

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION REUTERS / SUHAIB SALEM Written by Kyle Sparks White paper EXECUTIVE SUMMARY Data collection during ediscovery is critically important because

More information

8 POINT PLAN TO ELIMINATE PST FILES

8 POINT PLAN TO ELIMINATE PST FILES 8 POINT PLAN TO ELIMINATE PST FILES C2C Systems 2013 www.c2c.co.uk When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

The Next Frontier. for Records Managers. Retention and Disposition of Structured Data:

The Next Frontier. for Records Managers. Retention and Disposition of Structured Data: Retention and Disposition of Structured Data: The Next Frontier for Records Managers Establishing a relationship with IT managers and learning about the basics of system technology will help the records

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Addressing the Abandoned Email Archive Risk

Addressing the Abandoned Email Archive Risk Addressing the Abandoned Email Archive Risk WHITE PAPER Table of Contents 3 Executive Summary 3 Introduction 4 What are Email Archives? 4 EOL, Obsolete, and Abandoned Email Archives 5 The Risks and Costs

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary Copyright Quest Software,

More information

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents DOCUMENT MANAGEMENT SOLUTIONS Speed the transition to an electronic environment Comprehensive, Integrated Management of Physical and Electronic Documents Store, protect and control your essential business

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHITEPAPER The Disconnect Between Legal and IT Teams The Duty to Preserve Why manual email archiving and user categorization doesn t cut it anymore #4 in a series of 4 whitepapers. Circulate this document

More information

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1 Corporate Governance - The Importance of a Compliant Record Retention Program by Christopher N. Weiss 1 A. Rationale for a Sound Record Retention Policy Record retention is crucial to disciplined corporate

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

EMC SourceOne Email Management and ediscovery Overview

EMC SourceOne Email Management and ediscovery Overview EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email

More information

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big

More information

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street

More information

Information Governance, Risk, Compliance

Information Governance, Risk, Compliance Information Governance, Risk, Compliance April White Paper By Galaxy Consulting A At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract May 2014 Information is the lifeblood

More information

Article originally appeared in the Fall 2011 issue of The Professional Engineer

Article originally appeared in the Fall 2011 issue of The Professional Engineer Article originally appeared in the Fall 2011 issue of The Professional Engineer Electronic Discovery in Litigation By Douglas P. Jeremiah, P.E., Esq. Your firm is involved in litigation and you get the

More information

AccessData Corporation

AccessData Corporation AccessData Corporation Using AccessData Lab to Perform Complete ediscovery Processing While Mitigating Risk: A Guide Providing Assurance and Protocol to Third-party EDD Providers White Paper Contents Introduction...

More information