Handling Large Data Sets

Size: px
Start display at page:

Download "Handling Large Data Sets"

Transcription

1 Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston

2 My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies

3 Today s Talk Forensics and E-Discovery Modern Cases increased data volume Handling Large Data Sets Collection, Filtering and Review Proportionality Summary

4 Forensics and E-Discovery

5 Forensics and E-Discovery Computer Forensics The detailed analysis of media and data. Examples: Data Theft, inappropriate use of computer systems, fraud, internet investigations Electronic Discovery The review of very large amounts of data, often by multiple people, often for civil cases. Examples: Litigation, Fraud, M&A, internal investigations

6 Modern Cases and Large Data Sets

7 Modern Cases and Large Data Sets Example data set from a company with 100 staff: 100 users within the company, 1 file server, 1 server Six backup tapes from the server Six back tapes from the file server 100 Laptops How much data in total?

8 Modern Cases and Large Data Sets How much data? Each backup tape contains a back up of 100 users Each user has around 4,000 s and 500 attachments per backup 450,000 s and documents per backup 2,700,000 documents in the backup set for s File server back up has 15,000 files 90,000 files for the file server backups Each laptop: 5500 documents (each has an file) Laptops 550,000

9 Modern Cases and Large Data Sets Example company of 100 staff, total files available for review: Over 3 MILLION this is documents only, and does not include system files or junk data. If all the documents were printed out, this would be expected to take up around 150 tonnes of paper.

10 Modern Cases and Large Data Sets A single case can have a potentially colossal data universe How is this volume of data reviewed or investigated?

11 Handling Large Data Sets

12 Handling Large Data Sets Standard Process will be: Collection Filtering Review Proportionality Act Proportionally at all times

13 Collection

14 Collection Select the sources of data to be collected: Desktop Laptops Servers Backup tapes Select the method of collection Everything active, deleted, & fragmented Active files only Only required file types Plan the Collection: Allow for the scale of imaging and collection 1 or 2 desktops or 100 s of laptops? Do back up tapes exist? If so have they been preserved?

15 Collection Collection can be very technical. Ensure that the collection is conducted correctly and legally The collection is critical to the whole case and often can not be repeated

16 Filtering

17 Filtering Filtering is key as it radically reduces the volume of data. Traditional Methods Filter on Custodian Filter on Date, e.g a date range Filter on File type, e.g only office documents and no graphics Keyword Searching Remove Duplicates Improved Technology Conceptual Searching Near De-Duplication

18 Conceptual Searching Filtering

19

20 Near De-Duplication Filtering

21

22

23

24

25

26

27

28

29 Reviewing the Data

30 Review Tools Designed to review huge quantities of documents, e-documents, and Huge Market, rapidly growing Charges usually based per gigabyte Price varies depending on the tool and the company

31 Review Tools Plan the Review: Who is going to review the data? How many people want to review the data simultaneously? Is the data to be viewed locally, nationally or globally? What is the aim of the review: Prepare for Trial? Locate Documents?

32 Review Tools Software Includes: ReviewDoc Concordance Introspect I-connect Attenex

33 I-Connect Review Tools

34

35

36

37 Review Tools Attenex: Conceptual Searching Graphical Representation Social Networks

38

39

40

41

42

43

44

45

46 Proportionality

47 Proportionality What is reasonable for collection and review? reasonable not defined in law. No UK case law on the subject of E-Disclosure. Many decisions are made pre-trial The US has many more cases and so more case law Zubulake vs. UBS Warburg Guidelines Recent FTC Guidelines [Autumn 2006] Custodian Presumption (no more than 35) Two-Year Relevant Time Period Preservation of Backup Tapes no need to immediately push for restoration De-Duplication and Near De-duplication

48 Summary

49 Summary Large Data Cases will always require: Collection, Filter, and Review Consider the use of latest technology to aid in the filtering Concept Searching, near de-duplication Consider the issues of proportionality while planning and executing a review Cases will require a blend of legal and technical knowledge Get advice, get it early, and follow a plan

50 Questions?

51 Contact Rob Weston

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Deloitte Discovery Caribbean & Bermuda Countries Guide

Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline

More information

Archival. Product Note

Archival. Product Note Email Archival Product Note Proposed by: 1 Introduction Email is the most important communication and business tool in used by organizations today as it contains business critical data. The growth of email

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

From the Lab to the Boardroom; Forensics goes mainstream

From the Lab to the Boardroom; Forensics goes mainstream From the Lab to the Boardroom; Forensics goes mainstream Jim Butterworth, EWC USN (Ret.), EnCE & GCIA, Director of Incident Response, Guidance Software Definition: P A G E 1 Computer Forensics The Scientific

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

Presented by: Jason C. Gavejian Morristown Office

Presented by: Jason C. Gavejian Morristown Office Presented by: Jason C. Gavejian Morristown Office jason.gavejian@jacksonlewis.com 973.538.6890 } Unauthorized use of, or access to, records or data containing personal information Personal Information

More information

North American Market for Electronic Content Archiving

North American Market for Electronic Content Archiving An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Conceptual Search ESI, Litigation and the issue of Language. David T. Chaplin Kroll Ontrack

Conceptual Search ESI, Litigation and the issue of Language. David T. Chaplin Kroll Ontrack Conceptual Search ESI, Litigation and the issue of Language David T. Chaplin Kroll Ontrack Across the globe, legal, business and technical practitioners charged with managing information are continually

More information

Digital Forensics. Module 3 CS 996

Digital Forensics. Module 3 CS 996 Digital Forensics Module 3 CS 996 Review from Module #2 Spam investigations Analyzing message headers Tools NetScan Tools Pro Sam Spade Geolocation service (Quova) Methods to reduce spam Legal CANSPAM

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

COMMENTARY. Information JONES DAY

COMMENTARY. Information JONES DAY February 2010 JONES DAY COMMENTARY Massachusetts Law Raises the Bar for Data Security On March 1, 2010, what is widely considered the most comprehensive data protection and privacy law in the United States

More information

Ontrack PowerControls for Microsoft Exchange Server ReadMe

Ontrack PowerControls for Microsoft Exchange Server ReadMe Ontrack PowerControls for Microsoft Exchange Server ReadMe Contents About the Free Trial Supported Environments User Credential and Permission Requirements Mailbox Creation Wizard Upgrading Ontrack PowerControls

More information

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How

More information

Managing Born- Digital Documents.

Managing Born- Digital Documents. Managing Born- Digital Documents www.archives.nysed.gov Objectives Review the challenges of managing born-digital records Provide Practical strategies to ensure born-digital records are well managed Understand

More information

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies. RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

Community Unit School District No. 1. School Board

Community Unit School District No. 1. School Board Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

White Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers

White Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All

More information

Management Case Study. Kapil Lohia

Management Case Study. Kapil Lohia Email Management Case Study Kapil Lohia ARMA Survey on Information Management Prepared or Not? > Majority of RIM professionals feel unprepared when it comes to email management 72% for ediscovery - 68

More information

Chapter 4 After Incident Detection

Chapter 4 After Incident Detection Chapter 4 After Incident Detection Ed Crowley Spring 10 1 Topics Incident Response Process SANs Six Step IR Process 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons

More information

Top 8 Healthcare Archiving and e-discovery Requirements

Top 8 Healthcare Archiving and e-discovery Requirements White paper Top 8 Healthcare Archiving and e-discovery Requirements www.proofpoint.com Table of Contents Overview... 3 Top 8 Healthcare Requirements... 3 1. Effective and Defensible E-discovery... 3 Search

More information

Enterprise Vault Overview Nedeljko Štefančić

Enterprise Vault Overview Nedeljko Štefančić Enterprise Vault Overview Nedeljko Štefančić 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

Background Search & People Search Data

Background Search & People Search Data Ultimate Background Search & People Search Data The Finest Due Diligence & Investigative Data Solutions Available! - Find People - Verify Identities - Prevent Fraud FOR A NO RISK TRIAL Call Trent Martin

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26

More information

PROFILE: ACCESS DATA

PROFILE: ACCESS DATA COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies

More information

Welcome to the Introduction to Concordance On Demand Training Series!

Welcome to the Introduction to Concordance On Demand Training Series! LexisNexis On Demand Training Introduction to Concordance 2012 LexisNexis. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical,

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation Mark Kaufman, Iron Mountain SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Hosted Acronis Backup Cloud. Keep your data safe with our cloud backup service, powered by Acronis

Hosted Acronis Backup Cloud. Keep your data safe with our cloud backup service, powered by Acronis Hosted Acronis Backup Cloud Keep your data safe with our cloud backup service, powered by Acronis Why choose Hosted Acronis Backup Cloud? Your most important business asset is data. After all, without

More information

Security Lessons Learned from HIPAA Enforcement

Security Lessons Learned from HIPAA Enforcement Security Lessons Learned from HIPAA Enforcement Presentation to HealthSec 12 August 7, 2012 Adam H. Greene, J.D., M.P.H. Partner, Davis Wright Tremaine Enforcement of the Security Rule HIPAA Security Rule

More information

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Financial CISM. Certified Information Security Manager (CISM) Download Full Version : Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as

More information

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts

More information

SEPTEMBER 2018

SEPTEMBER 2018 www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering

More information

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 HIPAA in 2017: Hot Topics You Can t Ignore Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 Breach Notification State Law Privacy Rule Authorizations Polices and Procedures The Truth Is Have created

More information

PRIVACY-SECURITY INCIDENT REPORT

PRIVACY-SECURITY INCIDENT REPORT SECTION I GENERAL INFORMATION Name of Staff Member Reporting Incident PRIVACY-SECURITY INCIDENT REPORT Telephone Number Email Address Division/Office/Facility Unit/Section Supervisor SECTION II PRIVACY

More information

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC DISCLAIMER THIS PAPER IS NOT A LEGAL ADVISE OR OPINION IT DOES NOT SPEAK FOR OR

More information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Expert Reference Series of White Papers. 12 Virtualization Myths Debunked

Expert Reference Series of White Papers. 12 Virtualization Myths Debunked Expert Reference Series of White Papers 12 Virtualization Myths Debunked 1-800-COURSES www.globalknowledge.com 12 Virtualization Myths Debunked Paul Simoneau, Global Knowledge Course Director, Network+,

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

9/30/2014. Oregon Public Risk Manager s Conference October Retention and Public Records Requests. Facts

9/30/2014. Oregon Public Risk Manager s Conference October Retention and Public Records Requests.  Facts Oregon Public Risk Manager s Conference October 2014 Email Retention and Public Records Requests Staff unaware email is public record Request for elected officials email messages Public meeting held through

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information

More information

Meta-Discovery Presents Challenges for Producing Parties

Meta-Discovery Presents Challenges for Producing Parties Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Understanding Computer Forensics

Understanding Computer Forensics Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

County of Sacramento

County of Sacramento Chief Information Officer Patrick Groff County Executive Terry Schutten County of Sacramento DATE: January 30, 2008 TO: FROM: SUBJECT: Agency Administrators and Department Directors Patrick Groff, Chief

More information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing

More information

Fraud Analytics: Taking Data Analytics to the Next Level

Fraud Analytics: Taking Data Analytics to the Next Level Fraud Analytics: Taking Data Analytics to the Next Level The Need for a Formal Process The ability of data analysis tests to help detect fraud depends greatly on what is done before and after the actual

More information

12 Minute Guide to Archival Search

12 Minute Guide to  Archival Search X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com June 2008 Foreword Too many whitepapers spend too much time building up to the meat of the

More information

What every attorney should know about E-security Also, ESI

What every attorney should know about E-security Also, ESI What every attorney should know about E-security Also, ESI Sean Markham Esq. McCarthy Law Firm, LLC smarkham@mccarthy-lawfirm.com Why should I care about security? Because it is a good idea! and, if that

More information

Conceptual Search Technology: Avoid Sanctions, Prevent Privilege Waiver & Understand Your Data

Conceptual Search Technology: Avoid Sanctions, Prevent Privilege Waiver & Understand Your Data Conceptual Search Technology: Avoid Sanctions, Prevent Privilege Waiver & Understand Your Data By, David Chaplin & Regina Jytyla, Esq. David Chaplin, Managing Consultant, heads the Advanced Search Technology

More information

Data Privacy Breach Policy and Procedure

Data Privacy Breach Policy and Procedure Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Records Retention Training

Records Retention Training Records Retention Training Purpose LSUHSC-NO must comply with state and federal records retention requirements in order to provide appropriate access to state information to the public and to limit the

More information

Digital Forensics. Module 1 CS 996

Digital Forensics. Module 1 CS 996 Digital Forensics Module 1 CS 996 Instructors Dr. Frederick Scholl Office Hours: 5-6 PM, Mondays E-mail: freds@monarch-info.com Phone 212-869-4458 I am not a lawyer! Kulesh Shanmugasundaram Professor Nasir

More information

Washington State Archives Public Records Management for Conservation Districts

Washington State Archives Public Records Management for Conservation Districts Washington State Archives Public Records Management for Conservation Districts Presented by: Scott Sackett Electronic Records Management Consultant, Eastern WA scott.sackett@sos.wa.gov 509-413-3296 June

More information

Business Advantages. In this age of heightened awareness of information security issues...

Business Advantages. In this age of heightened awareness of information security issues... In this age of heightened awareness of information security issues... Businesses of every size, in every industry both regulated and nonregulated are recognizing the critical value of DeliverySlip. DELIVERYSLIP.COM

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

Top 8 Healthcare Archiving & ediscovery Requirements

Top 8 Healthcare Archiving & ediscovery Requirements Top 8 Healthcare Archiving & ediscovery Requirements John Wang Sr. Product Marketing Manager threat protection compliance archiving & governance secure communication Contents Overview...3 Top 8 Healthcare

More information

Public Records and Records Retention

Public Records and Records Retention Public Records and Records Retention Administrative Professionals Workshop July 15, 2016 Presented by: Lisa M. Freiley, Staff Counsel / PACE Administrator Agenda Public Records Law Overview. How to respond

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 1 History of Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

DATA BREACH NUTS AND BOLTS

DATA BREACH NUTS AND BOLTS DATA BREACH NUTS AND BOLTS Your Company Has Been Hacked Now What? January 20, 2016 Universal City, California Sponsored by Hogan Lovells Moderator: Stephanie Yonekura, Hogan Lovells #IHCC16 Panelists:

More information

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber IBM Compliance Offerings For Verse and S1 Cloud 01 June 2017 Presented by: Chuck Stauber IBM Connections & Verse Email and collaboration platform designed to help you work better Empower people Teams are

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The

More information

COMPUTER MEMORY AND STORAGE CONCEPTS FOR ALL COMPUTER SYSTEMS

COMPUTER MEMORY AND STORAGE CONCEPTS FOR ALL COMPUTER SYSTEMS COMPUTER MEMORY AND STORAGE CONCEPTS FOR ALL COMPUTER SYSTEMS Memory Concepts: Computer memory is the Random Access Memory that all computer systems use to store the working instructions for the operating

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations Background The NALA Certifying Board provides oversight for the development and ongoing maintenance of the Certified

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

2010 E-discovery Best Practices from Real-World Cases

2010 E-discovery Best Practices from Real-World Cases 2010 Clearwell E-discovery Best Practices From Real-World Cases page : 1 2010 E-discovery Best Practices from Real-World Cases A Clearwell White Paper 2010 Clearwell E-discovery Best Practices From Real-World

More information

AAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO

AAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy

More information

Michael McCartney, President

Michael McCartney, President Michael McCartney, President Litigation Landscape Computer Forensics Overview Forensic Data vs. Non-Forensic Dangers of Hard Drives Forensic Process HR Escrow Proactive Forensics Pit falls to avoid 1 650

More information

Technology in Litigation:

Technology in Litigation: Technology in Litigation: Tools to Find & Present Needles From the Discovery Haystack California Department of Transportation Legal Division Construction Law Workshop April 15, 2011 I. Introduction Basic

More information