Jim McGann shows how Data Profiling can be used to see what data you have, locate loose email, find ex-employee data and perform PII audits to make sure all data is secure.
See how he charts out how easy the process can be and real examples of how to get started.
go to chalk talk: http://bit.ly/SrsnCS
Strategic advantages to a centralized corporate platform include early, direct access to ESI in the wild, single instance collection storage, shared indexes, cross matter designations and universal chain of custody.
So how do you minimize the distortion of the telephone game and gain confidence in your process? That is exactly what is driving technology providers to add centralized workflow and collaboration features to their offerings.
Read full article from eDiscovery Journal’s expert Greg Buckles:
New Webinar – August 23rd – Will show how implementing a defensible deletion strategy not only mitigates long term risks and liabilities related to enterprise data assets, but also saves time and expense in supporting ongoing litigation and eDiscovery efforts.
Register for this webinar>
New White Paper:
Data mapping provides an inventory and profile of user content and is the key foundation to any corporate data policy definition. You must first understand what you have before you can develop a sound policy that will protect the organization from harm and long term risk. With a data map deployed you can easily manage data more effectively moving what is required by compliance onto legal hold, securing sensitive content in the corporate archive, and purging data that no longer has business value. The challenge with data mapping is that the infrastructure is complex and vast.
Obtaining a view into the content has been a manual and time consuming process, and one that quickly becomes obsolete as the data evolves. With today’s technology a data map can be automated so that a comprehensive and insightful view of current data is possible. Read this White Paper and Learn more about how to Use a Data Map to understand and manage your content.
Learn more about Data Mapping>
It is not uncommon for people to either accidentally or purposely delete e-mails, thinking that they are gone forever. However, having an e-mail vital to a judge’s ruling in a lawsuit go missing can lead to costly and time consuming procedures needed to retrieve it as well as sanctions. Read Full Article from ELLBlog eLessons Learned http://bit.ly/TjLUFo
Learn more about email management and archiving>
Defensible deletion is focused on legal and how to manage risk and long term liability. The goal is to manage data according to policy, find what no longer has business value or is required by legal and purge it from the network. Many organizations are finding that saving 20 or more years of electronic data on their networks and servers is not a good idea. However defensible deletion should be as interesting a concept for IT as it is for legal. IT is challenged with storage and information management budgets. The money that IT has had at their disposal has decreased and they are under tight scrutiny to make ever dollar count. Defensible deletion is a major cost savings to IT and would allow them to recoup significant budget that can be reallocated to more immediate projects versus unnecessary storage expenses. Industry analysts state that by defensibly deleting user data that no longer has business value or is required for legal hold or regulatory purposes, organizations can recoup anywhere from 40 to 70% of their storage resources. This could easily represent tens of millions of dollars in IT budget, a number any organization would love to have in their pocket.
The benefits of defensible deletion are many. IT should look at this as an opportunity to reclaim budgets and streamline their operations. Legal already sees the benefits. Defensible deletion is a win-win across the organization.
According to Barry Murphy of the eDJ Group 1/3 of organizations have a Defensible Deletion program in place as a key component of their overall Information Governance strategies. Another 1/3 have plans to deploy such a program in the near future. This is a major step from the days of “saving everything” which eventually results in risk and liability. Read full article:
Penalties issued in case where emails were not produced at the request of the judge. The plaintiff could not initially find the emails, but after digging deeper into all ESI sources found the relevant emails on legacy backup tapes. This caused the judge to issue fines and sanctions for failing to preserve emails. Backup tapes have become a key source of relevant ESI and are often the only source of data that has been purged from online sources. Organizations must include backup tapes when implementing legal hold and preservation efforts. Ignoring legacy backup tapes will be the cause for future fines and sanctions. Read Article: http://bit.ly/N8CCKp
Why Implement a Defensible Deletion Strategy – Information Governance Best Practices
A Methodology for Controlling Cost and Managing Risk – WEBINAR
Simply stated, information is either an asset to an organization, or it is a liability. This idea isn’t new. Organizations have been practicing records and information management for years – assessing the value of corporate information against business, legal and regulatory needs and then making conscious retention and disposition decisions.
While these disposition drivers remain paramount, in today’s information-based economy and technology-driven business environment, controlling cost and mitigating risk has become an increasingly complex, and often times daunting task.
This webinar brought to you by Merrill Corporation and Index Engines will show how implementing a defensible deletion strategy not only mitigates long term risks and liabilities related to enterprise data assets, but also saves time and expense in supporting ongoing litigation and eDiscovery efforts.
Register for this webinar> http://bit.ly/KB7iPM
Date: Tue June 26, 2012
Time: 2:00pm EST.
eDiscovery projects are always faced with extremely tight deadlines and complex technical challenges. When a Florida based manufacturing firm had to produce ESI they knew that they had a number of choices in eDiscovery platforms, but didn’t have time to research the best solution for their needs. Collection was to be performed against a 14TB corpus of unstructured user data and time was short. This client decided to bring in two different platforms that both claimed high speed processing and they would deploy the platform that completed the processing of the data first. The race was on.
See which platform wins the race and how…