ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
|
|
- Betty Robertson
- 6 years ago
- Views:
Transcription
1 ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
2 WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive slides, recording and survey
3 SPEAKERS Matthew Verga Director, ediscovery Strategy Carolyn Young Senior Solutions Architect
4 TODAY S TOPICS A Data Targeting Perspective Data Targeting - Before Litigation - During Collection - During Processing - During ECA Strategy and Negotiation Conclusion - Key Takeaways - Questions and Answers
5 A DATA TARGETING PERSPECTIVE
6 A DATA TARGETING PERSPECTIVE Why does this matter? - Because of the high and ever-increasing cost of discovery 2012 Rand Corporation Study: - Median cost of ediscovery production was $1.8 million - Document review accounted for $0.73 of every $1.00 spent - the relationship between final costs and ESI volume is essentially a directly proportional one. Thus, volume reduction = cost reduction
7 A DATA TARGETING PERSPECTIVE What do we mean by a data targeting perspective? - Elevating technical considerations - Elevating strategic considerations - At each step: o What are the technically feasible options o Strategic value of culling versus retention o Interplay between technical, strategic, and legal
8 A DATA TARGETING PERSPECTIVE What you legally need to review and/or produce What it is technically feasible to do What efficiently uses available time and money
9 A DATA TARGETING PERSPECTIVE Sources File Types Dates Keywords
10 A DATA TARGETING PERSPECTIVE Desired Message Threads DATASET Desired Concept Clusters
11 A DATA TARGETING PERSPECTIVE This program is not about knowing it all Knowing it all is a full-time job you don t have time to do This program is about Familiarizing you with the range of options available Demonstrating how the options work together Equipping you to pose the right questions to the right people
12 BEFORE LITIGATION
13 DATA TARGETING BEFORE LITIGATION Don t wait for litigation to begin Proactive steps can be taken to reduce volumes and costs First, retention and remediation can be addressed - Critical first step - Clear policies and procedures - Categories and retention periods - Limiting duplicative retention - Remediation to compliance
14 DATA TARGETING BEFORE LITIGATION Second, proactive data mapping can be completed Benefits of pre-litigation data mapping Elements of a useful data map - Potentially relevant data stores - What records for what time periods - Searching and extraction options - Responsible individuals/roles - Employee-issued devices in use
15 DURING COLLECTION
16 DATA TARGETING DURING COLLECTION Reactive data mapping Selecting custodians and sources Custodian interviews - Importance - Paper vs. electronic options Physical vs. logical acquisition - When to select which option?
17 DATA TARGETING DURING COLLECTION Selective Restoration - Forensic image and content reports o Usefulness o Limitations - Selection by directory, group or mailbox o o Loose files - Back-up tape options o Options and current technology - Selection by date o Limitations and risks File type filtering o Options and considerations
18 DURING PROCESSING
19 DATA TARGETING DURING PROCESSING Inclusion vs. exclusion - What is the difference? Directory or custodian filtering - Available options De-NISTing - What is it? - How is it executed?
20 DATA TARGETING DURING PROCESSING File-type filtering - Methods - Associated risks De-duplication - General method - Options available - Significance and impact - Document families
21 DATA TARGETING DURING PROCESSING Date range filtering - Methods - Associated risks and considerations Keyword filtering - Available options - What to look out for? - Better to wait?
22 DURING ECA
23 DATA TARGETING DURING ECA ECA vs EDA - EDA FTW (for the win) - Value increases with data volume - Many options, many tool-specific Random sampling - Utility and benefits - Sample sizes - Things you can learn
24 DATA TARGETING DURING ECA communication filtering - Sender and recipient - Domain names - Subject lines Keyword filtering - Simple, Boolean, fuzzy - ECA/EDA is the time o Best search tools o Best reporting options o Easiest iteration Objective decision making False positive keyword hits Privilege decisions Workflows for prioritizing o More responsive o Custodians
25 DATA TARGETING DURING ECA threading - Grouping, sequencing, content analysis, visualization - Organization versus disposition Near duplicate identification - Multiple techniques, variable thresholds - Organization versus disposition Conceptual analytics - Conceptual searching and clustering, categorization, CAR - Advantages and disadvantages
26 STRATEGY AND NEGOTIATION
27 STRATEGY AND NEGOTIATION The kitchen sink approach is not recommended Broad overview provided to show range Project specific strategies must be developed - Factors to consider o Available time o Available budget o Technological resources o Human resources o Matter-specific concerns
28 STRATEGY AND NEGOTIATION Data Targeting Before Litigation (EDRM IM Phase) Data Reduction During Collection (EDRM Identification, Preservation and Collection Phases) Retention, Remediation, Mapping Targeted Collection, Selective Restoration Data Targeting During Processing (EDRM Processing Phase) Data Targeting During ECA (EDRM Analysis Phase)* Directory Filtering, Custodian Filtering, De- NISTing, File-Type Filtering, Deduplication Date Range Filtering, Keyword Filtering Random Sampling, Communication Filtering, Keyword Filtering, Conceptual Analytics, Threading Review
29 STRATEGY AND NEGOTIATION Negotiation can be the most powerful tool of all Negotiation with opposing parties - Before, during, and after 26(f) - With judge, if necessary Negotiated agreements - Can limit scope - Can specify methodology - Can be incorporated into orders and enforced
30 CONCLUSION
31 KEY TAKEAWAYS Elevate technical and strategic considerations Understand the available options and limitations at each stage Consider the strategic value of culling versus retention Use technology to your advantage, but be consistent in your approach Document your decisions and rationales Seek expert help where needed
32 Q / A
33 ENGAGE WITH MODUS Modus coming tomorrow with slides, recording, survey and invite to next webinar Visit us online at for more information on next webinar on June 24 th at 1:00PM EDT entitled: Approaching TAR An Insider s Guide to Avoiding Common Problems Make sure to visit our website for valuable white papers, regular blog posts, ongoing surveys and more at Including the white paper Zeroing In A Data Targeting Perspective On Reducing E-Discovery Cost covering the topics from this program Thank you!
Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationE-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS
E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing
More informationA Lawyer s Guide to ediscovery Processing
A Lawyer s Guide to ediscovery Processing What You Should Know to Competently Handle Your Case Christian DeTrude Lexbe ediscovery Webinar Series About our Webinars If you have technical issues or questions,
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data
More informationBest Practices to Avoid Missing Key Evidence in Large Document Reviews
Best Practices to Avoid Missing Key Evidence in Large Document Reviews How Proper or Improper Search, Processing and Indexing can Make or Break Your Case Erin Derby, ACEDS Lexbe ediscovery Webinar Series
More informationViewpoint Review & Analytics
The Viewpoint all-in-one e-discovery platform enables law firms, corporations and service providers to manage every phase of the e-discovery lifecycle with the power of a single product. The Viewpoint
More informationShielding the Organization from Data Risk & E- Discovery Failures
Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,
More informationAnalytics Workflows for Smaller Cases. kcura LLC. All rights reserved.
Analytics Workflows for Smaller Cases The Dallas Steering Committee Sonya Everitt Gardere Wynne Sewell Matt Deegan Jackson Walker 2015 kcura. All rights reserved. Who are you? Analytics for Smaller Cases
More informationArchive to the Cloud: Hands on Experience with Enterprise Vault.cloud
Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email
More informationAnalytics Workflows for Smaller Cases and QC Workflows. kcura LLC. All rights reserved.
Analytics Workflows for Smaller Cases and QC Workflows The Detroit Steering Committee Phillip Shane, Miller Canfield Kimberly Fisher, Dickinson Wright Ellen Kain, Dykema 2015 kcura. All rights reserved.
More informationSEPTEMBER 2018
www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationLos Angeles User Group
Los Angeles User Group Good to Great: Optimizing Review with 5 Simple Workflow Enhancements How does a user group work You, the community, drive the user group s topics and conversation kcura is here to
More informationARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING
EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts
More informationWashington DC User Group
Washington DC User Group Analytics Workflows for Smaller Cases and QC Workflows The D.C. Steering Committee Kristin Thompson Williams & Connolly Margaret Havinga - Williams & Connolly Richard Addison -
More informationForensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success
Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success Effective Internal Investigations For Compliance Professionals November 10, 2011 Agenda Electronically Stored
More informationNuix ediscovery Specialist
Nuix ediscovery Specialist Nuix ediscovery Specialist ADVANCE TWO-DAY INSTRUCTOR-LED COURSE Nuix ediscovery Specialist training is a two-day course that will work through the complete ediscovery workflow,
More informationWHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.
WHITE PAPER ediscovery & Netmail SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR. ediscovery and Netmail In the ediscovery world, the Electronic Discovery Reference Model (EDRM) has been the
More informationTuesday, April 19, 2016
Relativity Users Group Richmond Assisted Review Best Practices & Tips Tuesday, April 19, 2016 Agenda Planning Stage Checklists Index Optimization Reviewer Training Project Stage Random vs. Judgmental Sampling
More informationREFINING YOUR E-DISCOVERY REPORTING. How to cut through the noise and produce relevant reporting
REFINING YOUR E-DISCOVERY REPORTING How to cut through the noise and produce relevant reporting INTRODUCTIONS Scott M. Cohen Daniel Meyers Scott Reents David Smith James A. Sherer Director, ediscovery
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationConduent Legal and Compliance Solutions Viewpoint ediscovery Platform. Viewpoint Data Workflow & Management
Conduent Legal and Compliance Solutions Viewpoint ediscovery Platform Viewpoint Data Workflow & Management Application Version: 6.3 April 13, 2018 2018 Conduent Business Services, LLC. All rights reserved.
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationA Litigator's Guide to Going Native
A Litigator's Guide to Going Native Pros, Cons and Tips for Native Review and Productions July 13, 2016 Gene Albert CEO Lexbe ediscovery Webinar Series Info and Future Webinars Webinars take place monthly
More informationVictor Stanley and the Changing Face
Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationPave the way: Build a value driven SAP GRC roadmap March 2015
www.pwc.be/erp Pave the way: Build a value driven SAP GRC roadmap March 2015 Agenda Introduction Measuring GRC Progression & Benchmarking GRC Program Roadmap Building a Business Case 2 Introduction Pave
More informationBy John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting
Office 365 ediscovery Background and Glossary By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Background What is Office 365? It is a cloud-based service providing
More information7 Ways to Save Big Money on ediscovery
7 Ways to Save Big Money on ediscovery You Don t Have to Break the Bank to Get Great Results A Computing Source White Paper December 2016 The volume of electronically stored information (ESI) continues
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationcosts maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com
Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response
More informationarchiving with Office 365
Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder
More informationBrainspace: Quick Reference
Brainspace is a dynamic and flexible data analysis tool. The purpose of this document is to provide a quick reference guide to navigation, use, and workflow within Brainspace. This guide is divided into
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationRINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.
RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationLeading Authority Doug Kaminski On 3 Key Ways To Protect Your IP. #FearlessLaw on High Performance Counsel
Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP #FearlessLaw on High Performance Counsel #BakersDozen is a series of interviews with leading professionals in the fields of law, consulting,
More informationDHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1
Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com
More informationHandling Large Data Sets
Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern
More informationMeta-Discovery Presents Challenges for Producing Parties
Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.
More informationHow to Jump-Start Early Case Assessment. A Case Study based on TREC 2008
How to Jump-Start Early Case Assessment A Case Study based on TREC 2008 For over a decade, the National Institute of Standards and Technology ( NIST ) has cosponsored the Text Retrieval Conference ( TREC
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationMiami User Group. Threading Workflows and Discussion. kcura LLC. All rights reserved.
Miami User Group Email Threading Workflows and Discussion Email Threading Structured analytics set Saved searches 1. Parent emails in document set Parent emails only Email From: is set AND Parent Doc ID:
More informationWhite Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers
White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationD4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED
D4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED This whitepaper compares keyword search, concept-based review methods, and support vector-based review platforms; how
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More information2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar
2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar Presented by Carrie Penman Chief Compliance Officer & Senior Vice President, Advisory Services Edwin O Mara Operations Manager,
More informationBefore Searching for Solutions It s All About the Data
Before Searching for Solutions It s All About the Data Stephen Watts - Federal Strategist for Information Governance Does your garage look like this? 2 The Real Problem With Data Growth TIME $ PROBLEMS
More informationTop 8 Healthcare Archiving and e-discovery Requirements
White paper Top 8 Healthcare Archiving and e-discovery Requirements www.proofpoint.com Table of Contents Overview... 3 Top 8 Healthcare Requirements... 3 1. Effective and Defensible E-discovery... 3 Search
More informationCybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference
www.pwc.com 2016 ISACA Atlanta Chapter Geek Week Conference Highlights from surveys 38% Amount of security incidents In 2015, 38% more security incidents were detected than in 2014. $4.9M Cost of security
More informationAvoiding the Top Meeting Mistakes. Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals
Avoiding the Top Meeting Mistakes Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals Meetings Media Meetings Media offers e-news! CIC Credit Today s Webinar is worth 1 hour of credit
More informationThe Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities. Vision Session IM B29
The Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities Shawn Aquino Senior Product Marketing Manager Alex Brown Senior Product Manager Vision 2012 - Session IM B29 1 Informed Decisions
More informationCyber Security and Data Management
Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis
More informationEarly case assessment Finding value beyond your next lawsuit
Early case assessment Finding value beyond your next lawsuit Contents 1 Introduction 2 Challenges of traditional ediscovery 3 ECA is an ediscovery game changer 4 ECA risks, opportunities, and considerations
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationReducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.
Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery
More informationDiscovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.
Discovery Attender Version 2.2 White Paper Discovery Attender is a member of the Attender Utilities family Table of Contents Introduction...3 Benefits...4 Product Overview...5 FAQ...8 Product History...12
More informationEnterprise Vault & e-discovery
Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing
More informationPinpoint Labs ESI Collection Tools
Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy
More information2010 E-discovery Best Practices from Real-World Cases
2010 Clearwell E-discovery Best Practices From Real-World Cases page : 1 2010 E-discovery Best Practices from Real-World Cases A Clearwell White Paper 2010 Clearwell E-discovery Best Practices From Real-World
More informationWelcome to Staying Ahead Webinar
Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations
More informationMeasuring Your. E-Discovery Program. Against Industry, 2015
Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and
More informationLeveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference
Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference April 11, 2016 kpmg.com Agenda 1. Survey said 2. Leveraging ediscovery technology to audit risk a. IP threat assessment
More informationAdvanced Security Centers. Enabling threat and vulnerability services in a borderless world
Advanced Security Centers Enabling threat and vulnerability services in a borderless world Contents Borderless security overview EY Advanced Security Centers Threat and vulnerability assessment services
More informationNext Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today
: What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal
More information7 Reasons to Worry About Your Current Archiving Strategy
7 Reasons to Worry About Your Current Email Archiving Strategy The data growth explosion facing most organizations today is coinciding with the mounting demands of stagnant IT budgets and an increased
More informationLondon User Group August 18, 2016
London User Group August 18, 2016 Analytics What is it and how can I use it? Where is Analytics used? Google Analytics Netflix Twitter Pandora itunes Genius Intelligence agencies High frequency trading
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationTop 10 Mistakes to Avoid When Creating Productions
Top 10 Mistakes to Avoid When Creating Productions Steer Clear of Common Pitfalls and Flawlessly Execute Productions October 30, 2014 Gene Albert Principal, Lexbe LC ediscovery Webinar Series Info Takes
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationPROFILE: ACCESS DATA
COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies
More informationNorth American Market for Electronic Content Archiving
An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com
More informationDeloitte Discovery Caribbean & Bermuda Countries Guide
Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or
More informationTop 8 Healthcare Archiving & ediscovery Requirements
Top 8 Healthcare Archiving & ediscovery Requirements John Wang Sr. Product Marketing Manager threat protection compliance archiving & governance secure communication Contents Overview...3 Top 8 Healthcare
More informationStart Now with Information Governance
Start Now with Information Governance Applying Information Governance to Unstructured Content 1 Information by 2020: The Big Picture There will be lots of it 35 ZB Generated by individuals >70% Digital
More informationNEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE
NEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE What Litigation Support Professionals Need To Know About Office 365 Compliance INTRODUCTIONS 1 SPEAKERS Troy Dunham Jake Frazier EJ Bastien
More informationBest Practices & Lesson Learned from 100+ ITGRC Implementations
Best Practices & Lesson Learned from 100+ ITGRC Implementations Presenter: Vivek Shivananda CEO of Rsam Dec 3, 2010 ISACA -NY Chapter Copyright 2002 2010 Relational Security Corp. (dba Rsam) Agenda Overview
More informationThe State of Data Center Health Management Strategy 2017
Strategic Alliance Partner Health Management Strategy The State of Data Center Health Management Strategy 2017 Fall 2017 Introduction Data has become one of the most valuable assets for 21st century businesses.
More informationExchange 2010 & 2013 Archiving & ediscovery Realities
Exchange 2010 & 2013 Brandy Markey Senior Product Marketing Manager Alex Brown Senior Product Manager Informed Decisions Where did Stu go wrong? Requirements Requirements Requirements Requirements Requirements
More informationBackup and Archiving for Office 365. White Paper
Backup and Archiving for Office 365 White Paper Summary There is often confusion between the two complementary processes of data backup and information archiving. In this white paper, we compare them and
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationPolicy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents
Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations
More informationThe Power of the Inbox Tips and Tricks for Successful Marketing
The Power of the Inbox Tips and Tricks for Successful Email Marketing Constant Contact 2015 Kimberly Beer Contact me: Midnight Productions, Inc & Constant Contact President, Constant Contact Authorized
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationLies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.
Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between
More informationIBM Atlas Suite Administrators Guide: Timer Tasks. for IBM Atlas Suite v6
IBM Atlas Suite Administrators Guide: Timer Tasks for IBM Atlas Suite v6 IBM Atlas Suite Administrators Guide: Timer Tasks This edition applies to version 6.0 of IBM Atlas Suite (product numbers 5725-D75,
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Germany Findings September 2016 Executive Summary Cloud adoption has increased 70% from last year, with 71% of companies in Germany pursuing
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Latin America Findings September 2016 Executive Summary Cloud adoption has increased 49% from last year, with 78% of companies in Latin America
More information