Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.



Similar documents
Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of

Windows shops that ignore electronic discovery requirements could be setting themselves up for some big costs.

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Symantec Enterprise Vault E-Discovery Connectors

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

S O L U T I O N P R O F I L E. StoredIQ s Flagship ediscovery for SharePoint

Clearwell Legal ediscovery Solution

What You Should Know About ediscovery

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

ediscovery AND COMPLIANCE STRATEGY

E- Discovery in Criminal Law

Symantec Enterprise Vault for Microsoft Exchange

for Insurance Claims Professionals

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Veritas Enterprise Vault.cloud for Microsoft Office 365

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions

Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator

the e-discovery how-to Guide page : 1 The E-Discovery Practical Recommendations for Streamlining Corporate E-Discovery A Clearwell White Paper

Symantec Enterprise Vault for Microsoft Exchange

One Easily Avoidable Pitfall in Your ediscovery and Compliance Strategy

Viewpoint ediscovery Services

Addressing Legal Discovery & Compliance Requirements

Symantec Enterprise Vault.cloud Overview

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

ediscovery Solutions

The evolution of data archiving

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

HOBS OVERVIEW INTRODUCTION

What's New With E-Discovery?

Meeting E-Discovery Challenges with Confidence

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

Litigation Solutions insightful interactive culling distributed ediscovery processing powering digital review

archiving: Planning, policies and. product. selection. chapter 1 -archiving project roadmap

Symantec Enterprise Vault.cloud Overview

ARCHIVING FOR EXCHANGE 2013

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server November 2011

CHAPTER OUTLINE. Copyright Delmar Learning. ALL RIGHTS RESERVED. 35

Vancouver Toronto Seattle

10 Reasons Why Enterprises Select Symantec.cloud for Archiving

Enhancing Document Review Efficiency with OmniX

A Radicati Group Webconference

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Litigation Support. Learn How to Talk the Talk. solutions. Document management

PAPERLESS IS POSSIBLE: A MODEL FOR IMPLEMENTING THE PAPERLESS LAW FIRM

Sample Electronic Discovery Request for Proposal

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

2972 NW 60 th Street, Fort Lauderdale, Florida Tel Fax

Symantec Enterprise Vault for Microsoft Exchange Server

Best Practices in Electronic Record Retention

How To Write A Request For Information (Rfi)

This Webcast Will Begin Shortly

Discovery in the Digital Age: e-discovery Technology Overview. Chuck Rothman, P.Eng Wortzman Nickle Professional Corp.

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Document Storage Tips: Inside the Vault

What Am I Looking At? Andy Kass

LexisNexis Concordance Evolution Amazing speed plus LAW PreDiscovery and LexisNexis Near Dupe integration

Disco reinvents ediscovery for lawyers. Introducing ediscovery software every lawyer can love.

Symantec Enterprise Vault Discovery.cloud

Proactive Data Management for ediscovery

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015

Veritas Enterprise Vault for Microsoft Exchange Server

Understanding ediscovery and Electronically Stored Information (ESI)

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

IBM Unstructured Data Identification and Management

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

Predictive Coding Defensibility and the Transparent Predictive Coding Workflow

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

White. Paper. How Archiving Reduces the Cost and Complexity of Reactive ediscovery. April 2010

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

E-Discovery for Backup Tapes. How Technology Is Easing the Burden

Five Steps to Ensure a Technically Accurate Document Production

Symantec ediscovery Platform, powered by Clearwell

Miguel Ortiz, Sr. Systems Engineer. Globanet

E-DISCOVERY: A Primer

INDEX. OutIndex Services...2. Collection Assistance...2. ESI Processing & Production Services...2. Computer-Based Language Translation...

storage management and user productivity with archiving

Archiving and ediscovery: Real World ROI from Hard Cost Savings

Are you ready for more efficient and effective ways to manage discovery?

WHITE PAPER. Deficiencies in Traditional Information Management

The ediscovery How-To Guide:

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

Recovering Microsoft Exchange Server Data

Addressing the Abandoned Archive Risk

Director, Value Engineering

Understanding How Service Providers Charge for ediscovery Services

The ediscovery Balancing Act

eclaris, Inc. Overview of Services 800 W. 6TH STREET, SUITE 1410, LOS ANGELES, CA TEL: (213)

Veritas Enterprise Vault Overview

Enhancing Microsoft Exchange & Office 365 Archiving, Retention, and Discovery with Netmail

E-Discovery Management in the Age of Big Data

THE E-DISCOVERY PLAYBOOK: A PROACTIVE TOOL FOR WINNING LITIGATION

Comprehensive Archiving as a Service

How ediscovery Technology Can Accelerate Information Governance for Corporations

Transcription:

THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the e-discovery process by learning which tools to use and when to use them.

CHAPTER Exploring e-discovery tools STAYING ON TOP of legal requests and litigation holds doesn t have to be so complicated. There are basic technical tools that can help provide a level of preparedness for litigation whether a company handles hundreds of lawsuits a year or only four or five annually and outsources the entire process to outside counsel or third-party vendors. The trick is knowing what the tools are and how to use them. Here is a list of the tools that can help simplify the e-discovery process: q Proactive litigation hold tools q Archive systems q Enterprise search tools q Reactive litigation hold tools q E-discovery processing tools q Review tools PROACTIVE HOLD Staying ahead of the game is critical when thinking about e-discovery. Because the crux of any litigation hold notice focuses on identifying Creating a litigation profile UNDERSTANDING THE required by Windows managers to handle litigation holds begins with an analysis of each company s litigation profile. Company profiles will vary, but IT staff should have an idea about the number of cases annually, the most common type of litigation and the way each case is handled. When creating a litigation profile, determine how the legal department handles the management of a standard case. Does it handle most litigation internally? Is it moving in this direction, or does it rely on outside counsel to handle all or part of each lawsuit? Many of these answers will help the IT staff best determine how to prepare for the type of litigation hold requests that will be issued. It will also help the staff figure out how IT fits into the litigation hold process and what types of tools will be required. 2 THE WINDOWS MANAGER S GUIDE TO

CHAPTER and preserving information, it s always beneficial to put in place tools that make it easier to do the core functions of searching and preserving the information. It also benefits a company to apply that same functionality to its business and IT processes as well. ARCHIVE SYSTEMS Email archives, in particular, can assist in capturing and centralizing electronically stored information within an organization. Depending on how the archive system is implemented, the archive can also ensure that documents are not deleted or modified a huge advantage when working under a litigation hold. Because the archive is indexed and searchable, it can be scanned for specific information related to a hold notice. The search result can be flagged, copied or exported for the purposes of preservation. More sophisticated archive tools also provide litigation hold features, allowing the legal department direct access to search within the archive and to place litigation holds on email without the need of IT staff. When looking at archival systems as a tool for litigation readiness, make sure that the system: e Allows the placement of multiple litigation holds on archived data. A single document in the archive may be subject to several legal holds. It s important that they can all be tracked separately so that removing one will not remove the others. r Archives the original document in a forensically defensible manner. It s essential that each archived document is an exact duplicate of the original file with no changes to the document s metadata or content. t Provides a centralized and secure storage area for all of the archived data. For litigation hold purposes, consider tools that allow copying of the information for a litigation hold onto a tamper-proof storage product. u Offers the ability to output the search to litigation-oriented software, such as CaseCentral, Case- Logistix, Concordance, Introspect, JFS Litigator's Notebook, Lextranet, Nmatrix, Ringtail, Summation and Virtual Partner. Individual archival tools are available for instant messaging and other data sources like SharePoint, but often the ability to archive these sources will be part of a well-rounded email archiving plan. The benefit of these all-in-one types of products is the centralization of all electronically stored data types into one searchable archive, which provides a single point of access for the legal team for litigation hold purposes. 3 THE WINDOWS MANAGER S GUIDE TO

The legal investigation is connected to the discovery request is connected to combing through terabytes of archived email is connected to your clean bill of health is connected to Symantec Enterprise Vault, the comprehensive archiving solution that makes managing email fast, efficient, and thorough. 200 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Enterprise Vault are registered trademarks of Symantec Corporation. Take control of your most important digital assets. Up to 5% of your company s intellectual property is in email or instant messaging. Today, a typical ediscovery request can cost IT departments countless hours and dollars to recover the specific range of messages on time. Symantec Enterprise Vault facilitates the legal and business best practices of storing, managing, and discovering email and other electronic files. So you re free to focus on the big picture. Learn more at www.enterprisevault.com Confidence in a connected world.

CHAPTER ENTERPRISE SEARCH Unstructured files are very difficult to search. In typical cases, the searching party will have only the traditional filename or creation date information. Enterprise search tools have strong indexing capabilities. The indexing itself typically adds specific pieces of metadata to each file, which prepares a file to be found at a later date. Comprehensive indexing is usually matched with an equally powerful search capability. In most cases, searching will sort through files based on previously created metadata. However, search capabilities are increasingly contextual, looking inside of files to locate important keywords or concepts. Enterprise search tools offer the following capabilities: e They allow the legal department to search and apply litigation holds. This self-service approach allows Windows managers to stay focused on IT projects. r They offer the ability to copy or export search results to a secure storage area. To preserve information under the litigation hold, the search tool needs to be able to identify and copy or export the search results to a secure area. And, like the archive, the copies must be exact copies for defensibility in court. t They can output the search to litigation-oriented software, such as CaseCentral, CaseLogistix, Concordance, Introspect, JFS Litigator's Notebook, Lextranet, Nmatrix, Ringtail, Summation and Virtual Partner. REACTIVE HOLD In many instances, organizations with proactive tools such as information archive solutions and enterprise search capabilities will still need other tools to identify, preserve and then deliver documents as part of the e-discovery and litigation hold process. Deciding on which tool is needed will depend on the level of expertise within the IT organization and at what stage the legal department decides to work with third-party vendors or outside counsel. FORENSICS Where chain of custody and potential fraudulent conduct is an issue, forensics tools are needed. When evidentiary information is produced, companies must be able to prove the veracity of the evidence itself. Although always important, forensics tools are especially critical when dealing with situations where fraudulent conduct is suspected and a user's computer behavior is in question. Because of the specialized skills needed for forensics collections, more companies are outsourcing this work 5 THE WINDOWS MANAGER S GUIDE TO

CHAPTER to third-party vendors. But because of the technical nature of the forensics process, any IT group that decides to bring this process in-house should have someone in the department attend certification training for forensics collection purposes. For litigation hold purposes, a forensics tool should be able to: e Mirror image hard drives and create exact duplicates of the subject hard drive. It is mandatory that the copy be a bit-level exact duplicate. r Index and search through native format data. t Restore deleted or otherwise difficult-to-access files and fragments. PROCESSING The process of extracting metadata and text from electronic documents is known as e-discovery processing. By extracting the metadata and text from electronic documents, such as email or word documents, attorneys can use the resulting data to help organize the electronic documents for review and production. The documents can be sorted according to specific metadata, such as email threads or creator, and grouped together for quick review. Typically, the e-discovery work is performed by third-party service providers that are skilled at handling large amounts of data and delivering the resulting data back to the firm or outside counsel in a loadable format that can be used by review or analysis tools. However, depending on the size of the e-discovery project, some companies are choosing to bring this process in-house. At a minimum, an e-discovery processing tool should include: e The ability to process multiple types of electronic documents, such as email messages and attachments, PDFs and Microsoft Office files. Most systems today will provide a list of more than 200 file types that can be processed. r Reporting tools to track individual jobs back to the original custodian or information source. t The ability to maintain document relationships through the process. For example, email and attachments should be kept together. u The ability to export data to common review application load files, such as Summation, Concordance, CaseLogistix and ASCII. i Exception logging capabilities to identify which documents could not be processed because of password protection or corruption. 6 THE WINDOWS MANAGER S GUIDE TO

CHAPTER REVIEW Another common area for outsourcing is the e-discovery review process, which is a necessary stage in the litigation hold and production portions of the e-discovery process. Once information has been identified as part of the litigation hold but before it is produced to opposing counsel each piece of information must be reviewed by the legal department or by outside counsel to ensure that the documents are relevant, not privileged and can be safely produced. Consider the following requirements for any review tool: e The ability to view multiple types of electronic documents. Similar to e-discovery processing tools, most review tools will provide a list of more than 200 file types that can be viewed by the application. r Able to work with both native and imaged documents. Although a majority of today s information is stored in electronic format, paper is still a common form of document storage. It is important that the review tool be able to work with both scanned-imaged paper documents as well as electronic versions. t A tool for flagging or tagging documents identified as non-responsive or privileged. Also needed is the ability to run a report that provides a list of the privileged documents that can be used in defense of the final produced set. u Tools for redacting portions of a document. When only a portion of a document is privileged or confidential, the reviewer needs to be able to take that portion out of the document before making it available for the other side. In the case of electronic documents, the review tool must have the ability to create an image of the native document so a redaction can be applied. i The ability to produce the reviewed documents. The final step in the review process is the creation of a production set of all information that will be produced to opposing counsel. The tool should be able to export and number both the images and electronic documents in an agreed-to format, such as.pdf. Given the large volumes of electronic data that corporations are now generating during e-discovery requests, it is common for legal departments to look for outside companies to host the review process. These third-party vendors have the staff and technology available to handle millions of documents at a time, with hundreds of reviewers. But for smaller cases in which the documents number in the hundreds or thousands, it may be more cost-effective to bring this process in-house. 8 THE WINDOWS MANAGER S GUIDE TO

CHAPTER ABOUT THE AUTHORS: Margie Semilof is the senior news director for TechTarget s Windows Media Group and is responsible for news coverage of the Windows platform. A high-tech journalist for more than 20 years, Semilof has written about a variety of technical topics ranging from hardware and software to telecom and networking. Kathryn Hilton has worked as an industry analyst for Gartner Group and for several large storage companies. She is currently a senior analyst for policy at Contoural Inc., a provider of business and technology consulting services that focuses on litigation readiness, compliance, information and records management, and data storage strategy. The Windows Manager s Guide to e-discovery is part of the Windows Manager s Guide series from SearchWinIT.com. Marilyn Cohodas Editorial Director mcohodas@techtarget.com Christine Casatelli Editor ccasatelli@techtarget.com Martha Moore Copy Editor mmoore@techtarget.com Linda Koury Art Director of Digital Content lkoury@techtarget.com Jonathan Brown Publisher jebrown@techtarget.com Matthew Salamone Director of Sales msalamone@techtarget.com 9 THE WINDOWS MANAGER S GUIDE TO