How To Answer A Question About Your Organization'S History Of Esi
|
|
|
- Ami Roberts
- 5 years ago
- Views:
Transcription
1 Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure. B. All responses should include all systems, practices, and procedures used at any time during the period three years prior to the present that may contain potentially responsive information. C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies. D. The term archive means long-term storage repositories for records, often for purposes of historical reference, and denotes a distinct concept from a backup, which is created in order to restore data if needed at a later date (e.g., for disaster recovery). II. Background Provide: A. current organizational charts for your organization s information technology ( IT ) unit; B. written policies related to document retention and management, along with when the policy was in effect and whether the policy is enforced and by whom; C. any existing diagrams of your organization s IT infrastructure; and D. a description of IT functions performed by outside contractors. III. Computer Hardware and Systems Describe the computer hardware and systems used in the conduct of your organization s business, addressing: A. the kinds of computers used (e.g., mainframe, work stations, desktops, laptops); B. the types and versions of all operating systems (including version) used (e.g., Windows, Linux, UNIX), including dates of major changes or upgrades; C. the types of servers used (e.g., Exchange servers), the approximate number of each server type, and the physical locations of servers; D. use of desktops, including where business information is saved and backed-up on the desktops, how the desktops are connected to the network (e.g., LAN), and any use for telecommuting; 1
2 E. use of laptops to conduct business, where business information is saved and backed-up on the laptops, how the laptops are connected to the network (e.g., remote access programs, synchronization procedures), and any use for telecommuting; F. use of employees own personal computers, how these computers are connected to your organization s network (e.g., remote access, web access), and where work-related ESI is saved and backed-up for these personal computers; G. use of handheld devices (e.g., BlackBerry devices, smartphones, personal digital assistants ( PDAs ), tablet devices (e.g., Apple ipads) (whether provided by your organization or the employee), how these devices are connected to your organization s network, and whether they contain business-related messages or documents not stored on the network (e.g., SMS or PIN messages); H. use of removeable storage media (e.g., thumb drives, CDs, external hard drives); I. all third-party storage locations containing ESI created by your organization (e.g., ASPs, cloud computing, external host servers); J. all legacy systems containing ESI not migrated to current systems; and K. where, and for how long, ESI created by former employees is stored. IV. Applications and Document Management Software Describe the applications and document management software used in your organization s business, addressing: A. and Other Electronic Communication Software 1. programs (including version) (e.g., Microsoft Outlook 2000 SP-3, webbased accounts) and any related applications used (e.g., contacts, calendar, notes, tasks); 2. where s are stored (e.g., on network servers, local drives); 3. limits on retention (e.g., size of mailbox, length of retention), and when such limits were put into effect; 4. whether s are routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; 5. use of Instant Messaging ( IM ) programs, and the period for which IM messages are retained; and 6. any voic system used, the programs used for voic retention, how long 2
3 voic s are retained, whether voic messages are migrated to another electronic system, e.g., , and the format in which voic is stored (e.g.,.wav, etc.). B. Other Applications 1. each application (including version) used to create ESI, including word processing, spreadsheet, presentation, financial and accounting, and any customized software applications; and 2. where ESI created through such programs is stored, and whether each such storage space is shared or personal. C. Document Management 1. each document management application (including version) used; 2. the types of ESI stored using such programs; and 3. where such ESI is stored. V. Internet, Intranet, and Other Web-based Information A. Describe the internet and intranet sites that your organization maintains, addressing: 1. the type information maintained on the each site; 2. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data on each site; 3. where each site is stored; and 4. whether ESI contained in each database is routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; and 5. any approval process or procedures to alter content on each site. B. Describe the web-based services your employees or the organization use in relation to your organization s business, addressing: 1. which, if any, social networking sites (e.g., Facebook, MySpace, Twitter), personal boxes (e.g., Hotmail, Gmail), collaboration tools (e.g., wikis, Sharepoint, blogs, WebEx), or video or photo sharing sites (e.g., YouTube, Flickr, Snapfish, etc.) are used; 2. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data in each web-based service; 3. where the information for each web-based service is stored; 3
4 4. how employees use each web-based service; 5. whether ESI contained in each web-based service is routinely deleted (or autodeleted) and the schedule or parameters for such deletions; and 6. any approval process or procedures to alter content on any web-based services. C. Identify any data room or temporary document repositories (e.g., due diligence rooms) created by the company in connection with the proposed transaction. VI. Databases Describe databases used in the conduct of your organization s business, addressing: A. the name of each such database and its underlying software (including version); B. the type of information each database contains; C. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data in each database; D. where each database is stored; E. whether ESI contained in each database is routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; and F. the availability of regular or standard reports, data dictionaries, manuals, and training materials for each database. VII. Disaster Recovery Backup and Archiving Procedures A. For each repository of ESI identified in response to this questionnaire, describe your organization s backup procedures, addressing: 1. the types of backups performed (e.g., full backups, incremental backups); 2. the types of data backed up (e.g., s, word processing documents); 3. the backup schedule (e.g., each business day, weekly, and monthly); 4. the period for which ESI contained on backups may be restored (i.e., the number of months or years backup media are retained before being overwritten); 5. whether backup media are individually labeled by type of data stored on the media, or by employees whose data is stored on the tape; 4
5 6. whether an individual box can be restored or the files of a single custodian restored, without restoring the entire backup media; 7. whether backup media are indexed and/or logged by backup software; 8. the type of media on which the backup data is stored, and the backup application (including version) used; 9. the use of any remote or on-line backup service; 10. the location of any and all backup media, whether on or off-site; 11. whether backup media have been restored within the last two years, for any purpose, including for other litigation or to retrieve data inadvertently deleted from computer systems; and 12. the cost associated with restoring one backup media component (e.g., one backup tape). B. For each repository of ESI identified in response to this questionnaire, describe your organization s archiving practices, addressing: 1. the types of ESI archived; 2. the frequency with which each type of ESI is archived; 3. whether archiving occurs automatically or is done manually; and 4. where archived ESI is stored. C. Have backups or archives been made of ESI outside of your normal procedures? (For example, in relation to a merger, acquisition, or sale of assets or a business line or in relation to the migration of ESI from one system to another.) If so, describe what was backed up or archived and whether it has been retained. IX. Preservation Efforts Describe the actions that have been undertaken to preserve ESI, addressing: A. the computer systems, applications, document management software, web-based information and systems, databases, and other systems containing ESI identified in response to this questionnaire; B. the individuals covered, including contractors and third parties; C. the time period covered; 5
6 D. backup and archiving media and systems; and E. preserving ESI on a going-forward basis. 6
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide
Electronic Data Retention and Preservation Policy 1
1 Purpose and Scope The purpose of this policy is to: Identify the types of College-related electronic information, including the location of the information; Identify what departments or individuals are
SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION
Below are SAMPLE interrogatories and requests for production that are meant to be complementary (i.e., any devices or electronic files that are identified in answer to an interrogatory or interrogatories
Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
E-Discovery Technology Considerations
E-Discovery Technology Considerations Presented by: Dave Howard Oregon Department of Justice Deputy CIO Topics E-Discovery Process Overview Sources of Electronically Stored Information (ESI) Data Maps
Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover
: Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS
PROCEDURE 4040P Community Relations PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS Electronic Discovery Committee To help meet its obligations, the WSD uses an Electronic Discovery Committee, made up
Electronic documents questionnaire
Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes
Dimension Data China/Hong Kong Limited
China/Hong Kong Limited I. Service Category (A) Productivity Apps Table 1a: Productivity Apps s (Service items passing all General, Description A00003 Hosted SharePoint Service Document and Content Management
E-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
Dimension Data China/Hong Kong Limited
I. Service Category (A) Productivity Apps Table 1a: Productivity Apps s (Service items passing all General, Security and Technical Requirements) Description Subscription Fee A00003 Dimension Data Hosted
How To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
PROTOCOL FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS AT WESTERN WASHINGTON UNIVERSITY
PROTOCOL FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS AT WESTERN WASHINGTON UNIVERSITY Under the Auspice of the WWU Public Records Group Wendy Bohlke Senior Counsel Tony Kurtz Archivist/Records
REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS
REED COLLEGE ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS TABLE OF CONTENTS A. INTRODUCTION... 1 B. THE LANDSCAPE OF ELECTRONIC RECORDS SYSTEMS... 1 1. Email Infrastructure...
Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S
Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S What is a Litigation Hold Notice? Notice from an authorized department (e.g., Attorney General s Office Torts
Miguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
GUIDELINES FOR ELECTRONIC DISCOVERY AT THE UNIVERSITY OF WASHINGTON
GUIDELINES FOR ELECTRONIC DISCOVERY AT THE UNIVERSITY OF WASHINGTON revised 4/27/11 TABLE OF CONTENTS A. INTRODUCTION... 1 B. ELECTRONIC DISCOVERY COMMITTEE... 1 C. THE LANDSCAPE OF UNIVERSITY ELECTRONIC
Glossary of terms used in the survey
Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
BACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
Electronic Records Management Guidelines
Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION Experience increasingly demonstrates that discovery of electronically stored information ( ESI poses challenges
FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence
EH I. Introduction FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS Records Retention Policy for Electronic Correspondence All business conducted by government agencies are subject to the Public Records law
University of Louisiana System
Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution
ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*
ESI DEMYSTIFIED Streamlining the E-Discovery Process Through Internal Processes and Controls Melinda Burrows Bruce Cosgrove* The widespread proliferation of electronically stored information (so-called
WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others
WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE A Guide for University Faculty, Staff, and Others What is a Litigation Hold Notice? Notice from an authorized UW department (Attorney General s Office,
IT Service Management. Company ABC Service Catalog
IT Management Company ABC Catalog 1 Company ABC Catalog Overview Introduction This document describes the catalog of services supported by Company ABC Email Division. Contents This publication contains
Security, Reliability & Control with Hosted Exchange
Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
Symantec Backup Exec 11d for Windows Small Business Server
Symantec Backup Exec 11d for Windows Small Business Server End-User Call Script for Sales This document is intended as a simple call structure to help get you started when selling Backup Exec 11d for Windows
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and
10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning
10 Things Your Data Center Backup Solution Should Do Reliable, fast and easy backup is only the beginning Table of Contents Ten Things Your Data Center Backup Should Do 1 #1: Reduce Hours Spent on Backup
A2: If the above list did not provide enough detail, please describe, in your own words, your enterprise s primary industry.
MeasureIT Survey Questions (Complete Budget and Staffing) NOTE: Budget questions only - sections A, B, C, G Staffing questions only - sections A, D, E, F, G, H Section A: Primary Demographic Information
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
Veritas Enterprise Vault Overview
TM Veritas Enterprise Vault Overview Store, manage, and discover critical business information Overview As an IT professional, you are challenged with identifying business critical information and determining
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or
Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based
A Winning Combination!!
Connect Cloud Continuity and 1 A Winning Combination!! Hosted Cloud Differentiators 2 TelePacific Cloud Services Communications Compliance & Security Collaboration Back up & Recovery Professional Services
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS We know that choosing a cloud service provider is an important decision. Understanding the facts about your provider is essential to setting expectations on
2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 2.2 Approved by : Information Governance
Hosted Exchange 2013
Our Cloud Services Hosted Exchange 2013 As a business professional you re under pressure to cut costs, streamline your business and become more productive and efficient, whilst making yourself more available
[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]
What follows isn t the perfect preservation letter for your case, so don t simply treat it as a form. Use it as a drafting aid that flags issues unique to EDD, but tailor your preservation demand to the
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
10 Reasons Why Enterprises Select Symantec.cloud for Archiving
WHITEPAPER EMAIL ARCHIVING 10 Reasons Why Enterprises Select Symantec.cloud for Archiving Who should read this paper CIOs, CFOs, IT Managers, Legal and Risk Management Officers, HR Managers WHITE PAPER:
The evolution of data archiving
The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.
How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq. IMPORTANT NOTICE This publication is not a do-it-yourself guide to resolving employment disputes or handling
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Accenture Company Limited
I. Service Category (A) Productivity Apps Table 1a: Productivity Apps s (Service items passing all General, Security and Technical Requirements) Description A00001 Office 365-E1 o SharePoint Online Plan
UMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.
Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company. Table of Contents Introduc on... 3 Microso Exchange Server Delivers Value Your Company
Veritas Enterprise Vault.cloud for Microsoft Office 365
TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of
2013 USER GROUP CONFERENCE
2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Hosting Solutions Made Simple. Hosted Exchange - Email for Small & Medium Businesses
Hosting Solutions Made Simple Hosted Exchange - Email for Small & Medium Businesses Compete More Effectively with Hosted Exchange Today s economy is especially hard on small businesses. How does your small
Approximately 260 PST files totaling 180GB will be included in the pilot. 2. Are the Windows XP clients running XP 64 bit or 32 bit OS?
Addendum #1 1. What is the count of PST files and total aggregate size of PST files that will need to be ingested for the pilot? Approximately 260 PST files totaling 180GB will be included in the pilot.
Protecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02
Protecting your SQL database with Hybrid Cloud Backup and Recovery Session Code CL02 ARCserve True Hybrid Data Protection ARCserve Backup Data protection for complex environments Disk to Disk to-tape Disk
6. FINDINGS AND SUGGESTIONS
6. FINDINGS AND SUGGESTIONS 6.1 Introduction: The advancements in ICT and their proper utilization by research and academic librarians are not only strengthening the capabilities of libraries but also
Records and Information Management and Retention
Records and Information Management and Retention Association of Corporate Counsel Nonprofit Organizations Committee Legal Quick Hit March 13, 2012 3 pm ET W. Warren Hamel Venable LLP 750 E. Pratt St. Baltimore,
What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?
What s New with Enterprise Vault 11? 1 Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Intelligent Information Management: Archive & ediscovery
Intelligent Information Management: Archive & ediscovery Byron Chang Senior Systems Engineer / Symantec Hong Kong Agenda 1 Today s Information Management Challenges 2 Why Information Management? 3 The
Comparing VMware Zimbra with Leading Email and Collaboration Platforms Z I M B R A C O M P E T I T I V E W H I T E P A P E R
Comparing VMware Zimbra with Leading Email and Collaboration Platforms Z I M B R A C O M P E T I T I V E W H I T E P A P E R Introduction Email is indispensable few applications are more critical to the
