How To Answer A Question About Your Organization'S History Of Esi



Similar documents
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.

Preservation and Production of Electronic Records

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

Electronic Data Retention and Preservation Policy 1

SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

E-Discovery Technology Considerations

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

15 Organisation/ICT/02/01/15 Back- up

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

Electronic documents questionnaire

Dimension Data China/Hong Kong Limited

E-Discovery Toolkit for Educational Institutions

Dimension Data China/Hong Kong Limited

How To Preserve Records In Mississippi

PROTOCOL FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS AT WESTERN WASHINGTON UNIVERSITY

REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

Miguel Ortiz, Sr. Systems Engineer. Globanet

GUIDELINES FOR ELECTRONIC DISCOVERY AT THE UNIVERSITY OF WASHINGTON

Glossary of terms used in the survey

The E-Discovery Process

BACKUP SECURITY GUIDELINE

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

USING GENIE REMOTELY

Electronic Records Management Guidelines

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence

University of Louisiana System

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

IT Service Management. Company ABC Service Catalog

Security, Reliability & Control with Hosted Exchange

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Symantec Backup Exec 11d for Windows Small Business Server

Module 5 Introduction to Processes and Controls

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

A2: If the above list did not provide enough detail, please describe, in your own words, your enterprise s primary industry.

Disaster Recovery Plan

Veritas Enterprise Vault Overview

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Version: Page 1 of 5

How To Deploy Cisco Jabber For Windows On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

A Winning Combination!!

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

How cloud computing can transform your business landscape

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

San Francisco Chapter. Information Systems Operations

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING

Hosted Exchange 2013

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Successful ediscovery in a Bring Your Own Device Environment

10 Reasons Why Enterprises Select Symantec.cloud for Archiving

The evolution of data archiving

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.

Symantec Enterprise Vault.cloud Overview

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Accenture Company Limited

UMHLABUYALINGANA MUNICIPALITY

A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.

Veritas Enterprise Vault.cloud for Microsoft Office 365

2013 USER GROUP CONFERENCE

Cloud Computing. What is Cloud Computing?

Hosting Solutions Made Simple. Hosted Exchange - for Small & Medium Businesses

Approximately 260 PST files totaling 180GB will be included in the pilot. 2. Are the Windows XP clients running XP 64 bit or 32 bit OS?

Protecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02

6. FINDINGS AND SUGGESTIONS

Records and Information Management and Retention

What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Symantec Enterprise Vault.cloud Overview

Intelligent Information Management: Archive & ediscovery

Comparing VMware Zimbra with Leading and Collaboration Platforms Z I M B R A C O M P E T I T I V E W H I T E P A P E R

Transcription:

Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure. B. All responses should include all systems, practices, and procedures used at any time during the period three years prior to the present that may contain potentially responsive information. C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies. D. The term archive means long-term storage repositories for records, often for purposes of historical reference, and denotes a distinct concept from a backup, which is created in order to restore data if needed at a later date (e.g., for disaster recovery). II. Background Provide: A. current organizational charts for your organization s information technology ( IT ) unit; B. written policies related to document retention and management, along with when the policy was in effect and whether the policy is enforced and by whom; C. any existing diagrams of your organization s IT infrastructure; and D. a description of IT functions performed by outside contractors. III. Computer Hardware and Systems Describe the computer hardware and systems used in the conduct of your organization s business, addressing: A. the kinds of computers used (e.g., mainframe, work stations, desktops, laptops); B. the types and versions of all operating systems (including version) used (e.g., Windows, Linux, UNIX), including dates of major changes or upgrades; C. the types of servers used (e.g., Exchange servers), the approximate number of each server type, and the physical locations of servers; D. use of desktops, including where business information is saved and backed-up on the desktops, how the desktops are connected to the network (e.g., LAN), and any use for telecommuting; 1

E. use of laptops to conduct business, where business information is saved and backed-up on the laptops, how the laptops are connected to the network (e.g., remote access programs, synchronization procedures), and any use for telecommuting; F. use of employees own personal computers, how these computers are connected to your organization s network (e.g., remote access, web access), and where work-related ESI is saved and backed-up for these personal computers; G. use of handheld devices (e.g., BlackBerry devices, smartphones, personal digital assistants ( PDAs ), tablet devices (e.g., Apple ipads) (whether provided by your organization or the employee), how these devices are connected to your organization s network, and whether they contain business-related messages or documents not stored on the network (e.g., SMS or PIN messages); H. use of removeable storage media (e.g., thumb drives, CDs, external hard drives); I. all third-party storage locations containing ESI created by your organization (e.g., ASPs, cloud computing, external host servers); J. all legacy systems containing ESI not migrated to current systems; and K. where, and for how long, ESI created by former employees is stored. IV. Applications and Document Management Software Describe the applications and document management software used in your organization s business, addressing: A. E-mail and Other Electronic Communication Software 1. e-mail programs (including version) (e.g., Microsoft Outlook 2000 SP-3, webbased e-mail accounts) and any related applications used (e.g., contacts, calendar, notes, tasks); 2. where e-mails are stored (e.g., on network servers, local drives); 3. limits on e-mail retention (e.g., size of mailbox, length of retention), and when such limits were put into effect; 4. whether e-mails are routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; 5. use of Instant Messaging ( IM ) programs, and the period for which IM messages are retained; and 6. any voicemail system used, the programs used for voicemail retention, how long 2

voicemails are retained, whether voicemail messages are migrated to another electronic system, e.g., email, and the format in which voicemail is stored (e.g.,.wav, etc.). B. Other Applications 1. each application (including version) used to create ESI, including word processing, spreadsheet, presentation, financial and accounting, and any customized software applications; and 2. where ESI created through such programs is stored, and whether each such storage space is shared or personal. C. Document Management 1. each document management application (including version) used; 2. the types of ESI stored using such programs; and 3. where such ESI is stored. V. Internet, Intranet, and Other Web-based Information A. Describe the internet and intranet sites that your organization maintains, addressing: 1. the type information maintained on the each site; 2. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data on each site; 3. where each site is stored; and 4. whether ESI contained in each database is routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; and 5. any approval process or procedures to alter content on each site. B. Describe the web-based services your employees or the organization use in relation to your organization s business, addressing: 1. which, if any, social networking sites (e.g., Facebook, MySpace, Twitter), personal e-mail boxes (e.g., Hotmail, Gmail), collaboration tools (e.g., wikis, Sharepoint, blogs, WebEx), or video or photo sharing sites (e.g., YouTube, Flickr, Snapfish, etc.) are used; 2. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data in each web-based service; 3. where the information for each web-based service is stored; 3

4. how employees use each web-based service; 5. whether ESI contained in each web-based service is routinely deleted (or autodeleted) and the schedule or parameters for such deletions; and 6. any approval process or procedures to alter content on any web-based services. C. Identify any data room or temporary document repositories (e.g., due diligence rooms) created by the company in connection with the proposed transaction. VI. Databases Describe databases used in the conduct of your organization s business, addressing: A. the name of each such database and its underlying software (including version); B. the type of information each database contains; C. which groups or categories of users (not lists of names of individuals) have rights to add, delete, or alter data in each database; D. where each database is stored; E. whether ESI contained in each database is routinely deleted (or auto-deleted) and the schedule or parameters for such deletions; and F. the availability of regular or standard reports, data dictionaries, manuals, and training materials for each database. VII. Disaster Recovery Backup and Archiving Procedures A. For each repository of ESI identified in response to this questionnaire, describe your organization s backup procedures, addressing: 1. the types of backups performed (e.g., full backups, incremental backups); 2. the types of data backed up (e.g., e-mails, word processing documents); 3. the backup schedule (e.g., each business day, weekly, and monthly); 4. the period for which ESI contained on backups may be restored (i.e., the number of months or years backup media are retained before being overwritten); 5. whether backup media are individually labeled by type of data stored on the media, or by employees whose data is stored on the tape; 4

6. whether an individual e-mail box can be restored or the files of a single custodian restored, without restoring the entire backup media; 7. whether backup media are indexed and/or logged by backup software; 8. the type of media on which the backup data is stored, and the backup application (including version) used; 9. the use of any remote or on-line backup service; 10. the location of any and all backup media, whether on or off-site; 11. whether backup media have been restored within the last two years, for any purpose, including for other litigation or to retrieve data inadvertently deleted from computer systems; and 12. the cost associated with restoring one backup media component (e.g., one backup tape). B. For each repository of ESI identified in response to this questionnaire, describe your organization s archiving practices, addressing: 1. the types of ESI archived; 2. the frequency with which each type of ESI is archived; 3. whether archiving occurs automatically or is done manually; and 4. where archived ESI is stored. C. Have backups or archives been made of ESI outside of your normal procedures? (For example, in relation to a merger, acquisition, or sale of assets or a business line or in relation to the migration of ESI from one system to another.) If so, describe what was backed up or archived and whether it has been retained. IX. Preservation Efforts Describe the actions that have been undertaken to preserve ESI, addressing: A. the computer systems, applications, document management software, web-based information and systems, databases, and other systems containing ESI identified in response to this questionnaire; B. the individuals covered, including contractors and third parties; C. the time period covered; 5

D. backup and archiving media and systems; and E. preserving ESI on a going-forward basis. 6