Your SlideShare is downloading. ×
0
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ARMA - eDiscovery Behind the Firewall

387

Published on

With 100s of terabytes of email, file shares and other applications, corporation face the potential loss of critical intellectual property, trade secrets and confidential information when outsourcing …

With 100s of terabytes of email, file shares and other applications, corporation face the potential loss of critical intellectual property, trade secrets and confidential information when outsourcing identification, collection, culling, early case assessment and first pass review. Outsourcing all is no longer an option from both a cost and risk perspective. In this session, attendees will learn the the types of ESI that must be produced for discovery, as well as how in-house eDiscovery practices can reduce collection and review costs, and minimize information leakage.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
387
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 1© Copyright 2010 EMC Corporation. All rights reserved. ARMA International's 55th Conference & Expo “eDiscovery Behind the Firewall” EMC SourceOne eDiscovery – Kazeon J. David Morris - November 2010
  • 2. 2© Copyright 2010 EMC Corporation. All rights reserved. Sources Format Electronic Content Cross-borderSpeed Volume Information by 2020: The Big Picture
  • 3. 3© Copyright 2010 EMC Corporation. All rights reserved. 10x increased costs to outsource $1.5M average cost per incident $34M average annual legal costs 89% of companies face litigation $18M+ cost to review 1 TB of info The eDiscovery Cost Factoid: The average Fortune 500 company has 147 concurrent lawsuits. Gartner
  • 4. 4© Copyright 2010 EMC Corporation. All rights reserved. Traditional eDiscovery Original ESI Duplicate copy of ESI Sent to Outside Counsel for Review Agent s
  • 5. 5© Copyright 2010 EMC Corporation. All rights reserved. SourceOne’s value proposition Integrated ESI Sources E-mail Systems Microsoft Exchange Domino/Lotus Notes PST/NSF personal archives File Systems Desktops Laptops CIFS/NFS File shares Content Management & Collaboration Systems EMC Documentum Microsoft SharePoint Symantec Enterprise Vault Early Case Assessment: Extensive analysis, searching and first-pass review for enterprise-wide data resulting in quick yet comprehensive assessment of case.
  • 6. 6© Copyright 2010 EMC Corporation. All rights reserved. Desktops, Remote Offices, and Laptops Custodian ESI Target Legal Hold Legal Hold or Legal Store or Preservation Store Collect Copy/Move Legal Store In-place Legal HoldE-mail Servers File Shares Backup Archives E-mail Archives Document Repositories Platform within the Firewall ESI Identification & Collection SourceOne Records Manager Celerra or Centera with FLR Documentum with Records Management eDiscovery Behind the Firewall InternetInternet Outside Counsel Review via VPN
  • 7. 7© Copyright 2010 EMC Corporation. All rights reserved. eDiscovery Behind the Firewall: Top Five Reasons 1. Gain insight into Corporate ESI • What do we have? • What do we do with it? • How to create policies and procedures to handle differing Info types? 2. Gain control of what and how much ESI leaves the corporation • Data Leakage • Risk Mitigation – Privileged, Confidential, Relevant and Non-Relevant • Increase time to data • Reduce dependence on or reduce Third party review costs • Implement Legal Hold 3. Gain understanding of Risk and create Legal Strategy for a specific Litigation • Who knew what when…. • Is there a “Smoking Gun” or ESI Vindication document 4. Increase responsiveness and capabilities to reduce frivolous law suits • Stop procedural focused cases • Reduce time to solution 5. Reduce litigation cost • Identification, PreCulling, Collection, Analysis, Review, and Production • Attorney and outside counsel time investment
  • 8. 8© Copyright 2010 EMC Corporation. All rights reserved. THANK YOU david.morris@emc.com

×