ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

Size: px
Start display at page:

Download "ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS"

Transcription

1 ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

2 WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive slides, recording and survey

3 SPEAKERS Matthew Verga Director, ediscovery Strategy Carolyn Young Senior Solutions Architect

4 TODAY S TOPICS A Data Targeting Perspective Data Targeting - Before Litigation - During Collection - During Processing - During ECA Strategy and Negotiation Conclusion - Key Takeaways - Questions and Answers

5 A DATA TARGETING PERSPECTIVE

6 A DATA TARGETING PERSPECTIVE Why does this matter? - Because of the high and ever-increasing cost of discovery 2012 Rand Corporation Study: - Median cost of ediscovery production was $1.8 million - Document review accounted for $0.73 of every $1.00 spent - the relationship between final costs and ESI volume is essentially a directly proportional one. Thus, volume reduction = cost reduction

7 A DATA TARGETING PERSPECTIVE What do we mean by a data targeting perspective? - Elevating technical considerations - Elevating strategic considerations - At each step: o What are the technically feasible options o Strategic value of culling versus retention o Interplay between technical, strategic, and legal

8 A DATA TARGETING PERSPECTIVE What you legally need to review and/or produce What it is technically feasible to do What efficiently uses available time and money

9 A DATA TARGETING PERSPECTIVE Sources File Types Dates Keywords

10 A DATA TARGETING PERSPECTIVE Desired Message Threads DATASET Desired Concept Clusters

11 A DATA TARGETING PERSPECTIVE This program is not about knowing it all Knowing it all is a full-time job you don t have time to do This program is about Familiarizing you with the range of options available Demonstrating how the options work together Equipping you to pose the right questions to the right people

12 BEFORE LITIGATION

13 DATA TARGETING BEFORE LITIGATION Don t wait for litigation to begin Proactive steps can be taken to reduce volumes and costs First, retention and remediation can be addressed - Critical first step - Clear policies and procedures - Categories and retention periods - Limiting duplicative retention - Remediation to compliance

14 DATA TARGETING BEFORE LITIGATION Second, proactive data mapping can be completed Benefits of pre-litigation data mapping Elements of a useful data map - Potentially relevant data stores - What records for what time periods - Searching and extraction options - Responsible individuals/roles - Employee-issued devices in use

15 DURING COLLECTION

16 DATA TARGETING DURING COLLECTION Reactive data mapping Selecting custodians and sources Custodian interviews - Importance - Paper vs. electronic options Physical vs. logical acquisition - When to select which option?

17 DATA TARGETING DURING COLLECTION Selective Restoration - Forensic image and content reports o Usefulness o Limitations - Selection by directory, group or mailbox o o Loose files - Back-up tape options o Options and current technology - Selection by date o Limitations and risks File type filtering o Options and considerations

18 DURING PROCESSING

19 DATA TARGETING DURING PROCESSING Inclusion vs. exclusion - What is the difference? Directory or custodian filtering - Available options De-NISTing - What is it? - How is it executed?

20 DATA TARGETING DURING PROCESSING File-type filtering - Methods - Associated risks De-duplication - General method - Options available - Significance and impact - Document families

21 DATA TARGETING DURING PROCESSING Date range filtering - Methods - Associated risks and considerations Keyword filtering - Available options - What to look out for? - Better to wait?

22 DURING ECA

23 DATA TARGETING DURING ECA ECA vs EDA - EDA FTW (for the win) - Value increases with data volume - Many options, many tool-specific Random sampling - Utility and benefits - Sample sizes - Things you can learn

24 DATA TARGETING DURING ECA communication filtering - Sender and recipient - Domain names - Subject lines Keyword filtering - Simple, Boolean, fuzzy - ECA/EDA is the time o Best search tools o Best reporting options o Easiest iteration Objective decision making False positive keyword hits Privilege decisions Workflows for prioritizing o More responsive o Custodians

25 DATA TARGETING DURING ECA threading - Grouping, sequencing, content analysis, visualization - Organization versus disposition Near duplicate identification - Multiple techniques, variable thresholds - Organization versus disposition Conceptual analytics - Conceptual searching and clustering, categorization, CAR - Advantages and disadvantages

26 STRATEGY AND NEGOTIATION

27 STRATEGY AND NEGOTIATION The kitchen sink approach is not recommended Broad overview provided to show range Project specific strategies must be developed - Factors to consider o Available time o Available budget o Technological resources o Human resources o Matter-specific concerns

28 STRATEGY AND NEGOTIATION Data Targeting Before Litigation (EDRM IM Phase) Data Reduction During Collection (EDRM Identification, Preservation and Collection Phases) Retention, Remediation, Mapping Targeted Collection, Selective Restoration Data Targeting During Processing (EDRM Processing Phase) Data Targeting During ECA (EDRM Analysis Phase)* Directory Filtering, Custodian Filtering, De- NISTing, File-Type Filtering, Deduplication Date Range Filtering, Keyword Filtering Random Sampling, Communication Filtering, Keyword Filtering, Conceptual Analytics, Threading Review

29 STRATEGY AND NEGOTIATION Negotiation can be the most powerful tool of all Negotiation with opposing parties - Before, during, and after 26(f) - With judge, if necessary Negotiated agreements - Can limit scope - Can specify methodology - Can be incorporated into orders and enforced

30 CONCLUSION

31 KEY TAKEAWAYS Elevate technical and strategic considerations Understand the available options and limitations at each stage Consider the strategic value of culling versus retention Use technology to your advantage, but be consistent in your approach Document your decisions and rationales Seek expert help where needed

32 Q / A

33 ENGAGE WITH MODUS Modus coming tomorrow with slides, recording, survey and invite to next webinar Visit us online at for more information on next webinar on June 24 th at 1:00PM EDT entitled: Approaching TAR An Insider s Guide to Avoiding Common Problems Make sure to visit our website for valuable white papers, regular blog posts, ongoing surveys and more at Including the white paper Zeroing In A Data Targeting Perspective On Reducing E-Discovery Cost covering the topics from this program Thank you!

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing

More information

A Lawyer s Guide to ediscovery Processing

A Lawyer s Guide to ediscovery Processing A Lawyer s Guide to ediscovery Processing What You Should Know to Competently Handle Your Case Christian DeTrude Lexbe ediscovery Webinar Series About our Webinars If you have technical issues or questions,

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

Best Practices to Avoid Missing Key Evidence in Large Document Reviews

Best Practices to Avoid Missing Key Evidence in Large Document Reviews Best Practices to Avoid Missing Key Evidence in Large Document Reviews How Proper or Improper Search, Processing and Indexing can Make or Break Your Case Erin Derby, ACEDS Lexbe ediscovery Webinar Series

More information

Viewpoint Review & Analytics

Viewpoint Review & Analytics The Viewpoint all-in-one e-discovery platform enables law firms, corporations and service providers to manage every phase of the e-discovery lifecycle with the power of a single product. The Viewpoint

More information

Shielding the Organization from Data Risk & E- Discovery Failures

Shielding the Organization from Data Risk & E- Discovery Failures Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,

More information

Analytics Workflows for Smaller Cases. kcura LLC. All rights reserved.

Analytics Workflows for Smaller Cases. kcura LLC. All rights reserved. Analytics Workflows for Smaller Cases The Dallas Steering Committee Sonya Everitt Gardere Wynne Sewell Matt Deegan Jackson Walker 2015 kcura. All rights reserved. Who are you? Analytics for Smaller Cases

More information

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email

More information

Analytics Workflows for Smaller Cases and QC Workflows. kcura LLC. All rights reserved.

Analytics Workflows for Smaller Cases and QC Workflows. kcura LLC. All rights reserved. Analytics Workflows for Smaller Cases and QC Workflows The Detroit Steering Committee Phillip Shane, Miller Canfield Kimberly Fisher, Dickinson Wright Ellen Kain, Dykema 2015 kcura. All rights reserved.

More information

SEPTEMBER 2018

SEPTEMBER 2018 www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering

More information

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,

More information

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing

More information

Los Angeles User Group

Los Angeles User Group Los Angeles User Group Good to Great: Optimizing Review with 5 Simple Workflow Enhancements How does a user group work You, the community, drive the user group s topics and conversation kcura is here to

More information

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts

More information

Washington DC User Group

Washington DC User Group Washington DC User Group Analytics Workflows for Smaller Cases and QC Workflows The D.C. Steering Committee Kristin Thompson Williams & Connolly Margaret Havinga - Williams & Connolly Richard Addison -

More information

Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success

Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success Effective Internal Investigations For Compliance Professionals November 10, 2011 Agenda Electronically Stored

More information

Nuix ediscovery Specialist

Nuix ediscovery Specialist Nuix ediscovery Specialist Nuix ediscovery Specialist ADVANCE TWO-DAY INSTRUCTOR-LED COURSE Nuix ediscovery Specialist training is a two-day course that will work through the complete ediscovery workflow,

More information

WHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.

WHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR. WHITE PAPER ediscovery & Netmail SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR. ediscovery and Netmail In the ediscovery world, the Electronic Discovery Reference Model (EDRM) has been the

More information

Tuesday, April 19, 2016

Tuesday, April 19, 2016 Relativity Users Group Richmond Assisted Review Best Practices & Tips Tuesday, April 19, 2016 Agenda Planning Stage Checklists Index Optimization Reviewer Training Project Stage Random vs. Judgmental Sampling

More information

REFINING YOUR E-DISCOVERY REPORTING. How to cut through the noise and produce relevant reporting

REFINING YOUR E-DISCOVERY REPORTING. How to cut through the noise and produce relevant reporting REFINING YOUR E-DISCOVERY REPORTING How to cut through the noise and produce relevant reporting INTRODUCTIONS Scott M. Cohen Daniel Meyers Scott Reents David Smith James A. Sherer Director, ediscovery

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

Conduent Legal and Compliance Solutions Viewpoint ediscovery Platform. Viewpoint Data Workflow & Management

Conduent Legal and Compliance Solutions Viewpoint ediscovery Platform. Viewpoint Data Workflow & Management Conduent Legal and Compliance Solutions Viewpoint ediscovery Platform Viewpoint Data Workflow & Management Application Version: 6.3 April 13, 2018 2018 Conduent Business Services, LLC. All rights reserved.

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

Three Common Techniques for E-Discovery Preservation

Three Common Techniques for E-Discovery Preservation www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

A Litigator's Guide to Going Native

A Litigator's Guide to Going Native A Litigator's Guide to Going Native Pros, Cons and Tips for Native Review and Productions July 13, 2016 Gene Albert CEO Lexbe ediscovery Webinar Series Info and Future Webinars Webinars take place monthly

More information

Victor Stanley and the Changing Face

Victor Stanley and the Changing Face Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Pave the way: Build a value driven SAP GRC roadmap March 2015

Pave the way: Build a value driven SAP GRC roadmap March 2015 www.pwc.be/erp Pave the way: Build a value driven SAP GRC roadmap March 2015 Agenda Introduction Measuring GRC Progression & Benchmarking GRC Program Roadmap Building a Business Case 2 Introduction Pave

More information

By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting

By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Office 365 ediscovery Background and Glossary By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Background What is Office 365? It is a cloud-based service providing

More information

7 Ways to Save Big Money on ediscovery

7 Ways to Save Big Money on ediscovery 7 Ways to Save Big Money on ediscovery You Don t Have to Break the Bank to Get Great Results A Computing Source White Paper December 2016 The volume of electronically stored information (ESI) continues

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response

More information

archiving with Office 365

archiving with Office 365 Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder

More information

Brainspace: Quick Reference

Brainspace: Quick Reference Brainspace is a dynamic and flexible data analysis tool. The purpose of this document is to provide a quick reference guide to navigation, use, and workflow within Brainspace. This guide is divided into

More information

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies. RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology

More information

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Overview of  Archiving. Cloud & IT Services for your Company. EagleMercury  Archiving EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury

More information

Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP. #FearlessLaw on High Performance Counsel

Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP. #FearlessLaw on High Performance Counsel Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP #FearlessLaw on High Performance Counsel #BakersDozen is a series of interviews with leading professionals in the fields of law, consulting,

More information

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1 Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com

More information

Handling Large Data Sets

Handling Large Data Sets Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern

More information

Meta-Discovery Presents Challenges for Producing Parties

Meta-Discovery Presents Challenges for Producing Parties Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.

More information

How to Jump-Start Early Case Assessment. A Case Study based on TREC 2008

How to Jump-Start Early Case Assessment. A Case Study based on TREC 2008 How to Jump-Start Early Case Assessment A Case Study based on TREC 2008 For over a decade, the National Institute of Standards and Technology ( NIST ) has cosponsored the Text Retrieval Conference ( TREC

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

Miami User Group. Threading Workflows and Discussion. kcura LLC. All rights reserved.

Miami User Group.  Threading Workflows and Discussion. kcura LLC. All rights reserved. Miami User Group Email Threading Workflows and Discussion Email Threading Structured analytics set Saved searches 1. Parent emails in document set Parent emails only Email From: is set AND Parent Doc ID:

More information

White Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers

White Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

D4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED

D4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED D4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED This whitepaper compares keyword search, concept-based review methods, and support vector-based review platforms; how

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of

More information

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar 2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar Presented by Carrie Penman Chief Compliance Officer & Senior Vice President, Advisory Services Edwin O Mara Operations Manager,

More information

Before Searching for Solutions It s All About the Data

Before Searching for Solutions It s All About the Data Before Searching for Solutions It s All About the Data Stephen Watts - Federal Strategist for Information Governance Does your garage look like this? 2 The Real Problem With Data Growth TIME $ PROBLEMS

More information

Top 8 Healthcare Archiving and e-discovery Requirements

Top 8 Healthcare Archiving and e-discovery Requirements White paper Top 8 Healthcare Archiving and e-discovery Requirements www.proofpoint.com Table of Contents Overview... 3 Top 8 Healthcare Requirements... 3 1. Effective and Defensible E-discovery... 3 Search

More information

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference www.pwc.com 2016 ISACA Atlanta Chapter Geek Week Conference Highlights from surveys 38% Amount of security incidents In 2015, 38% more security incidents were detected than in 2014. $4.9M Cost of security

More information

Avoiding the Top Meeting Mistakes. Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals

Avoiding the Top Meeting Mistakes. Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals Avoiding the Top Meeting Mistakes Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals Meetings Media Meetings Media offers e-news! CIC Credit Today s Webinar is worth 1 hour of credit

More information

The Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities. Vision Session IM B29

The Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities. Vision Session IM B29 The Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities Shawn Aquino Senior Product Marketing Manager Alex Brown Senior Product Manager Vision 2012 - Session IM B29 1 Informed Decisions

More information

Cyber Security and Data Management

Cyber Security and Data Management Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis

More information

Early case assessment Finding value beyond your next lawsuit

Early case assessment Finding value beyond your next lawsuit Early case assessment Finding value beyond your next lawsuit Contents 1 Introduction 2 Challenges of traditional ediscovery 3 ECA is an ediscovery game changer 4 ECA risks, opportunities, and considerations

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery

More information

Discovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.

Discovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family. Discovery Attender Version 2.2 White Paper Discovery Attender is a member of the Attender Utilities family Table of Contents Introduction...3 Benefits...4 Product Overview...5 FAQ...8 Product History...12

More information

Enterprise Vault & e-discovery

Enterprise Vault & e-discovery Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing

More information

Pinpoint Labs ESI Collection Tools

Pinpoint Labs ESI Collection Tools Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy

More information

2010 E-discovery Best Practices from Real-World Cases

2010 E-discovery Best Practices from Real-World Cases 2010 Clearwell E-discovery Best Practices From Real-World Cases page : 1 2010 E-discovery Best Practices from Real-World Cases A Clearwell White Paper 2010 Clearwell E-discovery Best Practices From Real-World

More information

Welcome to Staying Ahead Webinar

Welcome to Staying Ahead Webinar Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations

More information

Measuring Your. E-Discovery Program. Against Industry, 2015

Measuring Your. E-Discovery Program. Against Industry, 2015 Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and

More information

Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference

Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference April 11, 2016 kpmg.com Agenda 1. Survey said 2. Leveraging ediscovery technology to audit risk a. IP threat assessment

More information

Advanced Security Centers. Enabling threat and vulnerability services in a borderless world

Advanced Security Centers. Enabling threat and vulnerability services in a borderless world Advanced Security Centers Enabling threat and vulnerability services in a borderless world Contents Borderless security overview EY Advanced Security Centers Threat and vulnerability assessment services

More information

Next Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today

Next Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today : What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal

More information

7 Reasons to Worry About Your Current Archiving Strategy

7 Reasons to Worry About Your Current  Archiving Strategy 7 Reasons to Worry About Your Current Email Archiving Strategy The data growth explosion facing most organizations today is coinciding with the mounting demands of stagnant IT budgets and an increased

More information

London User Group August 18, 2016

London User Group August 18, 2016 London User Group August 18, 2016 Analytics What is it and how can I use it? Where is Analytics used? Google Analytics Netflix Twitter Pandora itunes Genius Intelligence agencies High frequency trading

More information

The Trail of Electrons

The Trail of Electrons E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic

More information

Top 10 Mistakes to Avoid When Creating Productions

Top 10 Mistakes to Avoid When Creating Productions Top 10 Mistakes to Avoid When Creating Productions Steer Clear of Common Pitfalls and Flawlessly Execute Productions October 30, 2014 Gene Albert Principal, Lexbe LC ediscovery Webinar Series Info Takes

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

PROFILE: ACCESS DATA

PROFILE: ACCESS DATA COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies

More information

North American Market for Electronic Content Archiving

North American Market for Electronic Content Archiving An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com

More information

Deloitte Discovery Caribbean & Bermuda Countries Guide

Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

Top 8 Healthcare Archiving & ediscovery Requirements

Top 8 Healthcare Archiving & ediscovery Requirements Top 8 Healthcare Archiving & ediscovery Requirements John Wang Sr. Product Marketing Manager threat protection compliance archiving & governance secure communication Contents Overview...3 Top 8 Healthcare

More information

Start Now with Information Governance

Start Now with Information Governance Start Now with Information Governance Applying Information Governance to Unstructured Content 1 Information by 2020: The Big Picture There will be lots of it 35 ZB Generated by individuals >70% Digital

More information

NEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE

NEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE NEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE What Litigation Support Professionals Need To Know About Office 365 Compliance INTRODUCTIONS 1 SPEAKERS Troy Dunham Jake Frazier EJ Bastien

More information

Best Practices & Lesson Learned from 100+ ITGRC Implementations

Best Practices & Lesson Learned from 100+ ITGRC Implementations Best Practices & Lesson Learned from 100+ ITGRC Implementations Presenter: Vivek Shivananda CEO of Rsam Dec 3, 2010 ISACA -NY Chapter Copyright 2002 2010 Relational Security Corp. (dba Rsam) Agenda Overview

More information

The State of Data Center Health Management Strategy 2017

The State of Data Center Health Management Strategy 2017 Strategic Alliance Partner Health Management Strategy The State of Data Center Health Management Strategy 2017 Fall 2017 Introduction Data has become one of the most valuable assets for 21st century businesses.

More information

Exchange 2010 & 2013 Archiving & ediscovery Realities

Exchange 2010 & 2013 Archiving & ediscovery Realities Exchange 2010 & 2013 Brandy Markey Senior Product Marketing Manager Alex Brown Senior Product Manager Informed Decisions Where did Stu go wrong? Requirements Requirements Requirements Requirements Requirements

More information

Backup and Archiving for Office 365. White Paper

Backup and Archiving for Office 365. White Paper Backup and Archiving for Office 365 White Paper Summary There is often confusion between the two complementary processes of data backup and information archiving. In this white paper, we compare them and

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations

More information

The Power of the Inbox Tips and Tricks for Successful Marketing

The Power of the Inbox Tips and Tricks for Successful  Marketing The Power of the Inbox Tips and Tricks for Successful Email Marketing Constant Contact 2015 Kimberly Beer Contact me: Midnight Productions, Inc & Constant Contact President, Constant Contact Authorized

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between

More information

IBM Atlas Suite Administrators Guide: Timer Tasks. for IBM Atlas Suite v6

IBM Atlas Suite Administrators Guide: Timer Tasks. for IBM Atlas Suite v6 IBM Atlas Suite Administrators Guide: Timer Tasks for IBM Atlas Suite v6 IBM Atlas Suite Administrators Guide: Timer Tasks This edition applies to version 6.0 of IBM Atlas Suite (product numbers 5725-D75,

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance

More information

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value All Are Trying, Some Are Benefiting; Few Are Maximizing Value Germany Findings September 2016 Executive Summary Cloud adoption has increased 70% from last year, with 71% of companies in Germany pursuing

More information

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value All Are Trying, Some Are Benefiting; Few Are Maximizing Value Latin America Findings September 2016 Executive Summary Cloud adoption has increased 49% from last year, with 78% of companies in Latin America

More information