Document Storage Tips: Inside the Email Vault

Similar documents
IBM ediscovery Identification and Collection

The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery.

Connections to External File Sources

Recovering Microsoft Exchange Server Data

IBM Unstructured Data Identification and Management

ILM et Archivage Les solutions IBM

Are Mailboxes Enough?

The evolution of data archiving

ARCHIVING FOR EXCHANGE 2013

# Is ediscovery eating a hole in your companies wallet?

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Symantec Enterprise Vault.cloud Overview

Guide to advanced ediscovery solutions

Symantec Enterprise Vault Discovery.cloud

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Archiving Decision Tree

10 Point Plan to Eliminate PST Files

EMC PERSPECTIVE EMC SourceOne Management

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Archiving Compliance Storage Management Electronic Discovery

Addressing Legal Discovery & Compliance Requirements

Capstone for Records Management

Management: A Guide For Harvard Administrators

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Why you need Cryoserver for your Office 365 cloud service

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

WaterfordTechnologies.com Frequently Asked Questions

10 Reasons Why Enterprises Select Symantec.cloud for Archiving

WHITE PAPER ONTRACK POWERCONTROLS. Recovering Microsoft Exchange Server Data

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

What Am I Looking At? Andy Kass

The Inevitable Extinction of PSTs

Spambrella Archiving Service Guide Service Guide

Symantec Enterprise Vault for Microsoft Exchange

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Symantec Enterprise Vault.cloud Overview

Enhancing Microsoft Exchange & Office 365 Archiving, Retention, and Discovery with Netmail

QuickSpecs HP Archiving software for Lotus Domino 2.1

Veritas Enterprise Vault for Microsoft Exchange Server

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server November 2011

Intelligent Information Management: Archive & ediscovery

IBM CommonStore Archiving Preload Solution

Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Solve your PST headaches with or without Archiving

INDEX. OutIndex Services...2. Collection Assistance...2. ESI Processing & Production Services...2. Computer-Based Language Translation...

Management in Today s Regulatory Environment

Symantec Enterprise Vault for Microsoft Exchange

The Business Case for ECA

Five Steps to Ensure a Technically Accurate Document Production

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Product Overview Archive2Anywhere Message Stub Management

Veritas Enterprise Vault.cloud for Microsoft Office 365

Solving.PST Management Problems in Microsoft Exchange Environments

Death to PST Files. The Hidden Costs of

Director, Value Engineering

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Lotus Domino

Digital Forensics, ediscovery and Electronic Evidence

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

C2C ArchiveOne & Microsoft Exchange Server 2013

Integrated archiving: streamlining compliance and discovery through content and business process management

SearchWinIT.com SearchExchange.com SearchSQLServer.com

Miguel Ortiz, Sr. Systems Engineer. Globanet

Managing PST Files. From Discovery to the Archive. Overview

Discovery Technology Group

EMC SourceOne Management and ediscovery Overview

3 Tips for Your Woes: Streamline. Simplify. Cloud.

A Guide to PST Files How Managing PSTs Will Benefit Your Business

Archiving, Retrieval and Analysis The Key Issues

CA Message Manager. Benefits. Overview. CA Advantage

How Long Should Be Saved?

Addressing Archiving and Discovery with Microsoft Exchange Server 2010

Electronic Discovery How can I be prepared? September 2010

The Disconnect Between Legal and IT Teams

Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud

Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure

Transcription:

Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360, New York (September 04, 2014, 6:28 PM ET) Information including email is the lifeblood of many modern businesses, and enterprises depend upon reliable information services such as email servers and document storage systems. However, every piece of information takes up space on an enterprise s storage devices or servers, and to put a new twist on an old cliché increasingly, enterprise database storage space (rather than time) is money. Often, older data is removed from production systems so that high volumes of stored information do not slow down day-to-day operations. This also helps to reduce overall costs. Thus, most companies run a combination of email archiving systems, document management systems, and in some cases, cloud-based backup systems. The combination of live and archival systems allow for the optimal Jon Kessler storage balance between production servers and hard-to-access backup tapes. For legal discovery, this balance means that well-run archiving solutions can greatly speed up electronic discovery, and lower the risk of spoliation during litigation or investigation. Risks and costs are lowered by indexing and de-duplicating messages and information, providing audit trails for actions taken, and allowing information to more easily be preserved in place as part of the litigation hold process. This article will discuss: common email archiving and document management systems in use today; how they impact electronic discovery; what to look for when collecting data for legal discovery from each system; and certain aspects of each application s limitations Armed with this information, counsel can make better-informed decisions when approaching the preservation and collections phases of any e-discovery project involving such systems.

What Are Email Archive Systems and How Do They Impact E-Discovery? Email archive systems are used so that data can be stored for potential retrieval in the future and/or to reduce IT loads on real-production systems. They are also used to facilitate the preservation of information contained therein for litigation, regulatory, investigatory, audit or compliance obligations. It is important for legal professionals to have a basic understanding of these systems, as archived data can be subject to discovery even though the original implementation of the email archive was not related to a particular litigation. It is important to note that not all email archiving solutions offer the same features and functionality, as there are many email archiving systems on the market from many providers. Commercial products available often include features such as data de-duplication across content types, retention management, content indexing and even some basic tools for e-discovery, such as legal hold functionality, advanced searching, and data export. Many email archiving systems also offer common policy management for migration, retention and discovery across multiple repositories. Beyond these core capabilities, and depending on an organization s particular needs, there are a number of additional features to consider that may be added as modules to a baseline system. Potential additional features include: Workflow management Enhanced legal hold/preservation features Extended data storage types Advanced search capabilities As noted above, email archives also reduce the load on active email systems. For this reason, many companies will choose to periodically move old email to less expensive archival storage. By centralizing email in an archive, organizations can reduce or eliminate the costs, risk, and burden associated with decentralized email management. In particular, organizations utilizing an email archive typically can avoid the cost, risk and burdens associated with identifying, preserving, and collecting locally stored message files,.pst files[1], and other scattered email from across networks and devices. What exactly is an email archive system, or email vault, as they are commonly known? Simply put, an email archive system preserves email to and from individuals, and makes it more easily searchable for various purposes. The email can be captured by the archive either directly from the email application, or during the transmission of the email from one computer to another. The messages are then typically stored on disk, and indexed to simplify future searches. Email archives can typically be can be configured in any of the following ways: Time-based (archived after a certain time period has elapsed, or a certain date has past) Size-based (archived after an email or mailbox exceeds a certain size) Attachment-based (all, or certain types of attachments are archived)

User-defined (custom per organization, and may include one or more of the above boundaries in addition to unique organizational parameters) Other key email archive system concepts include: Email journaling: All emails that are sent and received by any user that is subject to journaling are stored in an email journal database. Since this is tracked at the server level and not the local level, folder structuring created after a message is sent or delivered is not maintained in the journal. Original setup: This refers to the process of identifying the original setup of the email archive system. For instance, it is important to know whether old emails from the mail system and archived mail such as PST or NSF[2] files were ingested into the system (thereby populating the archive with legacy email) when it was brought online, or whether the archive was turned on as an empty archive on day one when it was implemented. Litigation hold changes/tracking: A litigation or legal hold is a direction to preserve ESI that is usually implemented by counsel for a company when that company is experiencing, or reasonably expects, a litigation to occur, and at any other time a preservation obligation exists. Once a triggering event has occurred and a preservation obligation attaches, it may mean that certain email which may be related to a matter or potential matter cannot be deleted and must be archived in order to effect preservation. Stubbing on the active email server: Stubbed emails are partial mail messages where one part of the message exists on the active mail server (and is visible in the user s mailbox) and the rest of the message (such as the body or attachments) are stored and linked to within the email archive system. Where collection of a user s mailbox subject to stubbing is contemplated, one should consider how to avoid the collection of stubbed emails (i.e., those messages that have been stripped of attachments and other data). In order to avoid costly re-work and incomplete collections, it is advised that the collection team develop a complete understanding (ahead of the collection process) of the policy that creates the stubbed email. Follow-up collections: Time-based research of new data or a refresh collection. For example, if a collection is performed on Aug. 1, 2012, for all mail prior to that date and another collection is required in the future, a date filter can be applied to only collect data created after the original collection. Although email archives tend to be feature-rich, there are certain things they DO NOT do very well. Examples include: Non-searchable text: Text that cannot be read cannot be indexed, and therefore cannot be searched by an email archive s search tool(s). It is important to remember that many scanned documents, such as contracts and other documents that have signature execution, may not have text in a form that can be readily searched. Therefore, if a search term is in a document, but the archive system doesn t OCR [3] documents, the document/image would be missed if the chosen method of searching for documents was only through keyword searching.

Encryption: Encrypted data is typically neither searched nor reported on as an exception in email archive systems. Embedded objects: Embedded objects such as Excel spreadsheets or other embedded content that are pasted into Word or other similar documents/files are typically not searched by email archive systems. Search syntax: Email archives typically employ search engines that are limited in their ability to apply complex search criteria or techniques. Extraction speed issues (e.g. one week or more to extract email from a single custodian) o Collection operations may need to split the size of the extraction criteria or run smaller incremental extractions based on dates to alleviate issues caused by large volumes of data o Export format (typically limited in file formats and accompanying metadata) o Available local or network storage for extraction of the email collected, as well as the log/temporary files required to perform the extraction Searching for email attachments: These sometimes cannot be searched as the email archive s indices may not include the content of attachments. Some enterprise email archiving solutions can present additional challenges, especially when it comes to the actual collection of archived mail. For example: The need to define custodians with multiple aliases Limitations in search capabilities or indexing Inconsistent results or wildcard issues Interface issues Corrupt indices Fragmented backend databases Not understanding these potential challenges could cause an incomplete, corrupt or incorrect export from the archive system. This, in turn, can cause extreme downstream challenges if not discovered until full-blown discovery is underway. Even worse, without a thorough understanding of the limitations of an email archive, certain omissions may not be readily apparent to the operator of the archive s search and export function. If a thorough understanding of the system and rigorous quality assurance/quality control processes are not in place prior to production, those omissions may be discovered by opposing counsel after production occurs. When the integrity of a party s production is called into question, serious consequences may follow. Whether judicially imposed, imposed by a regulator, or simply economic in nature, it is clear that when dealing with archives, an ounce of prevention or understanding in this case is worth a pound of cure.

Conclusion The ability to make an informed decision when approaching any evidentiary collection or e-discovery project ideally before your company s IT team or legal counsel is under the gun of an active investigation or litigation is key to smoothing what can be a complex and expensive process. Taking the time to understand your email archiving system, assessing it for compatibility with your e-discovery processes, and testing the results of a controlled exercise will likely be very informative. The outcome of the investigative process and the test case results may well lead to a formal assessment or health-check for your organization s email archive. This proactive approach could yield an email archive update, repair, or hotfix where necessary, and is crucial to maintaining a reliable source of archival information. A holistic review of archiving tools, policies and processes is part of a forwardthinking information governance strategy, and will inevitably lead to a reduction in downstream costs, risks, questions and frustrations. By Jon Kessler, Epiq Systems Inc. Jon Kessler is director of Epiq Systems' forensic consulting group The opinions expressed are those of the author(s) and do not necessarily reflect the views of the firm, its clients, or Portfolio Media Inc., or any of its or their respective affiliates. This article is for general information purposes and is not intended to be and should not be taken as legal advice. [1] Microsoft Outlook email container file [2] IBM Lotus Notes email container file [3] Optical Character Recognition Computer recognition of text that has been scanned or otherwise exists in a graphical format. The text in these graphical formats cannot typically be searched by computers unless and until the text is scanned and converted by a computer into processable text/words. All Content 2003-2014, Portfolio Media, Inc.