SlideShare a Scribd company logo
1 of 44
Best Practices for Long Term Digital Archival In the beginning there was a stone and a tablet… Peter Mojica VP, Product Strategy, Mgmt AXS-One Inc. www.axsone.com
a day in the life…
CEO What now?
Audit?
CEO CIO
CIO No problem
A few hours later A few hours later
CEO CIO
CEO WOW
S S Super CIO
E-mail Subject: MEMO Hmmm???
CIO is sweating Hold On!
E-mail Subject: MEMO
CIO
Find MEMO hut–hut…
32 Days Later 32 Days Later
Found the MEMO yawn Finally, I can go home
CEO CIO
MEMO Subject: Hmmm??? Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction
Don’t Go No, not again!
MEMO Subject: Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction
73 Days Later 73 Days Later
I should’ve considered the bigger picture… CIO on the run. . . c’ya CIO on the run. . . c’ya I should’ve considered the bigger picture… CIO CIO CIO CIO
perspectives ,[object Object],[object Object],[object Object]
May 2005 Mar 2007                                                                               Print this article  Close This Window Morgan Stanley case highlights e-mail perils Fri May 20, 2005 5:45 PM BST  By Michael Christie MIAMI (Reuters) - The  $1.45 billion judgement against Morgan Stanley  for deceiving billionaire Ronald Perelman over a business deal has a lesson all companies should learn --  keeping e-mails is now a must, experts say . Banks and broker-dealers are obliged to retain e-mail and instant messaging documents for three years under U.S. Securities and Exchange Commission rules.  But similar requirements will apply to all public companies from July 2006 under the Sarbanes-Oxley corporate reform measures. At the same time,  U.S. courts are imposing increasingly harsh punishments on corporations that fail to comply with orders to produce e-mail documents, the experts said . Where judges once were more likely to accept that incompetence or computer problems might be to blame, they are now apt to rule that  non-compliance is an indication a company has something to hide. &quot;Morgan Stanley is going to be a harbinger,&quot; said Bill Lyons, chief executive officer of AXS-One Inc. <AXO.A>, a provider of records retention software systems. &quot;I think general counsels around the world are going to look at this as a legal Chernobyl .“ Wednesday's $1.45 billion verdict against Morgan Stanley in West Palm Beach, Florida, was the product of just such a negative ruling on e-mail retention, which is also expected to form the backbone of the Wall Street firm's appeal. Circuit Court Judge Elizabeth Maass, frustrated at Morgan Stanley's repeated failure to provide Perelman's attorneys with e-mails, handed down a pretrial ruling that effectively found the bank had conspired to defraud Perelman when he sold Coleman Co. to appliance maker Sunbeam Corp. in 1998. Morgan Stanley was working for Sunbeam, which entered bankruptcy in 2001, rendering worthless the shares Perelman had received in part payment for Coleman. In a rare step, Maass switched the burden of proof to Morgan Stanley, and instructed the jury solely to decide whether Perelman had relied on Morgan Stanley. Morgan Stanley says that ruling denied it a fair trial. But Eric Rosenberg, a former litigator with Merrill Lynch and now president of e-mail policy consultants LitigationProofing, said Maass was within her rights to rule as she did and could have even taken a more drastic step of issuing a default judgement and taking the verdict out of the jury's hands. Other cases have also resulted in rulings on e-mails. Last July, U.S. District Judge Shira Scheindlin found that Swiss bank UBS <UBSN.VX> had willfully destroyed potential e-mail evidence in a sex discrimination case brought by equity saleswoman Laura Zubulake. The judge ordered UBS to pay Zubulake's costs, and a jury later awarded her $29.2 million.  Experts said e-mail retention could be a double-edged sword if not accompanied by corresponding training for employees on the legal implications of e-mails they send.  When New York Attorney General Eliot Spitzer investigated the research divisions of Wall Street firms five years ago, he fined Morgan Stanley a little under $10 million for not having a proper e-mail retention policy in place. Merrill Lynch, however, which did have good backup systems and was able to produce relevant e-mails, had to pay over $100 million because some e-mails contained compromising material. &quot;I guess I would put it as 'no good deed went unpunished',&quot; said former Merrill Lynch counsel Rosenberg. Jay Ritter, a professor of finance at the University of Florida, said a danger was that among millions of legitimate e-mails, investigators might find one flippant comment from a low-level manager and take it as reflecting company policy.  &quot;There's a reason why certain people, why lawyers like to talk on the phone rather than have any written record of conversations,&quot; Ritter said.
[object Object],So what’s the point? ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Today’s Enterprise Focus.  Is it all over the place? Where is the hockey puck within your organization? &quot;A good hockey player plays where the puck is. A great hockey player plays where the puck is going to be.&quot; Wayne Gretzky
finding the “puck”
further industry consolidation is inevitable Message Management Legal Response Software Storage technologies Backup Recovery Archival technologies Records Management Document  Management Search technologies Business Intelligence Hygiene Anti-Virus
so why is this so hard?
Corporate confusion in solving the problem of archival ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business vs. Technology Corporate HARMONY starts with agreement on what the problem you are trying to solve is…then priortize
Focus on Security – Manage security across the IT Landscape ,[object Object],[object Object],[object Object],[object Object],[object Object],Take Away ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Industry Roll out of security Data  Integrity Identity  Integrity Process  Integrity Business  Continuity Increased complexity Manage Security and Access Maintain Evidentiary Weight Secure  business  processes and  critical assets
so who has the puck? ,[object Object],[object Object],[object Object],[object Object],[object Object],?
The Industry for Archival  As it relates to our long term digital records management of ESI What Do Canals and Railroads Have in Common With the Archival and Compliance Industry ? * Andy Grove, Intel CEO conference 2001 I recently heard Andy Grove, of Intel, say &quot;The convergence of computers, telephones, and cable TV is like water meeting land -   new life forms are likely to be created .&quot;   TIME
3 things to talk about today ,[object Object],[object Object],[object Object]
Is this  the problem? if yes, then  we are  spending 100%  of our time  to solve a  very small  percentage of the  problem the reality is that companies trust  their employees and most all employees  do the right thing, trust is not the issue
Fundamental Changes in Archival that have caused industry disruption ,[object Object]
Fundamental Principles ,[object Object],http://www.dansmc.com/ < 70’s – 80’s
Early Mainframe Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],80’s
Open Systems, C, Java, Unix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],90’s
Web, HTTP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],mid to late 90’s
What changed? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the heart of your digital archive? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The heart of the matter!
Things to remember ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
How Artificial Intelligence (AI) Is Used To Make Beer
How Artificial Intelligence (AI) Is Used To Make BeerHow Artificial Intelligence (AI) Is Used To Make Beer
How Artificial Intelligence (AI) Is Used To Make BeerBernard Marr
 
Slack, Social Media and Self-Deleting Texts: Developments in Employment Law
Slack, Social Media and Self-Deleting Texts: Developments in Employment LawSlack, Social Media and Self-Deleting Texts: Developments in Employment Law
Slack, Social Media and Self-Deleting Texts: Developments in Employment LawLogikcull
 
Discovering Your Client's Company Issue Results In Better Copy
Discovering Your Client's Company Issue Results In Better CopyDiscovering Your Client's Company Issue Results In Better Copy
Discovering Your Client's Company Issue Results In Better Copywirywoman1987
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Charles Krugel
 
Employee extortion
Employee extortionEmployee extortion
Employee extortionrhey02
 
Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmEddie Cogan
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
Newest bsmp russ ppt 8.23.12
Newest bsmp russ ppt 8.23.12Newest bsmp russ ppt 8.23.12
Newest bsmp russ ppt 8.23.12rcpayne
 
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...MECConference
 
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
Ethical issues in electronic commerce  focus on privacy   barbra dozier's blogEthical issues in electronic commerce  focus on privacy   barbra dozier's blog
Ethical issues in electronic commerce focus on privacy barbra dozier's blogParag Barman
 
Data Protection Magazine
Data Protection Magazine Data Protection Magazine
Data Protection Magazine teresadepiano
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”IDology, Inc
 
3 Steps To Tackle The Problem Of Bias In Artificial Intelligence
3 Steps To Tackle The Problem Of Bias In Artificial Intelligence3 Steps To Tackle The Problem Of Bias In Artificial Intelligence
3 Steps To Tackle The Problem Of Bias In Artificial IntelligenceBernard Marr
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 

What's hot (20)

ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
How Artificial Intelligence (AI) Is Used To Make Beer
How Artificial Intelligence (AI) Is Used To Make BeerHow Artificial Intelligence (AI) Is Used To Make Beer
How Artificial Intelligence (AI) Is Used To Make Beer
 
Slack, Social Media and Self-Deleting Texts: Developments in Employment Law
Slack, Social Media and Self-Deleting Texts: Developments in Employment LawSlack, Social Media and Self-Deleting Texts: Developments in Employment Law
Slack, Social Media and Self-Deleting Texts: Developments in Employment Law
 
Discovering Your Client's Company Issue Results In Better Copy
Discovering Your Client's Company Issue Results In Better CopyDiscovering Your Client's Company Issue Results In Better Copy
Discovering Your Client's Company Issue Results In Better Copy
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014Krugel's Assurance University Social Media & Law Presentation May 2014
Krugel's Assurance University Social Media & Law Presentation May 2014
 
Employee extortion
Employee extortionEmployee extortion
Employee extortion
 
Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory Paradigm
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Newest bsmp russ ppt 8.23.12
Newest bsmp russ ppt 8.23.12Newest bsmp russ ppt 8.23.12
Newest bsmp russ ppt 8.23.12
 
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...
Safe(er) Communications--Attorney Client Privilege; Walker, Roger; RAWalker &...
 
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
Ethical issues in electronic commerce  focus on privacy   barbra dozier's blogEthical issues in electronic commerce  focus on privacy   barbra dozier's blog
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
 
Data Protection Magazine
Data Protection Magazine Data Protection Magazine
Data Protection Magazine
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
3 Steps To Tackle The Problem Of Bias In Artificial Intelligence
3 Steps To Tackle The Problem Of Bias In Artificial Intelligence3 Steps To Tackle The Problem Of Bias In Artificial Intelligence
3 Steps To Tackle The Problem Of Bias In Artificial Intelligence
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 

Viewers also liked

What is Backup, Archive & Cloning and why should you care?
What is Backup, Archive & Cloning and why should you care?What is Backup, Archive & Cloning and why should you care?
What is Backup, Archive & Cloning and why should you care?Archiware GmbH
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataArkivum
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesTony Pearson
 
Lotar 101 Overview Current Jan 2009
Lotar 101 Overview Current Jan 2009Lotar 101 Overview Current Jan 2009
Lotar 101 Overview Current Jan 2009Rick Zuray
 
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKenna
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKennaPistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKenna
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKennaPistoia Alliance
 
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...RTTS
 

Viewers also liked (6)

What is Backup, Archive & Cloning and why should you care?
What is Backup, Archive & Cloning and why should you care?What is Backup, Archive & Cloning and why should you care?
What is Backup, Archive & Cloning and why should you care?
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of Data
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
Lotar 101 Overview Current Jan 2009
Lotar 101 Overview Current Jan 2009Lotar 101 Overview Current Jan 2009
Lotar 101 Overview Current Jan 2009
 
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKenna
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKennaPistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKenna
Pistoia Alliance US Conference 2015 - 1.1.4 Innovation in Pharma - Chris McKenna
 
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...
Data Warehousing in Pharma: How to Find Bad Data while Meeting Regulatory Req...
 

Similar to Best practices for long-term digital archiving

Essay Cars Enslave Us Rather Than Liberate Us
Essay Cars Enslave Us Rather Than Liberate UsEssay Cars Enslave Us Rather Than Liberate Us
Essay Cars Enslave Us Rather Than Liberate UsAmanda Anderson
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Managementgetripcord
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Aleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationAleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationMediabistro
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Gordon Hoke
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)ClubHack
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed NewsletterYigal Behar
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2Frank Braski
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics OklahomaJon Sutten
 
What SMEs can learn from the BA data breach
What SMEs can learn from the BA data breachWhat SMEs can learn from the BA data breach
What SMEs can learn from the BA data breachVicky Bradford
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 

Similar to Best practices for long-term digital archiving (20)

Essay Cars Enslave Us Rather Than Liberate Us
Essay Cars Enslave Us Rather Than Liberate UsEssay Cars Enslave Us Rather Than Liberate Us
Essay Cars Enslave Us Rather Than Liberate Us
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Management
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Aleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationAleksandr Yampolskiy Presentation
Aleksandr Yampolskiy Presentation
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
10 reasons hr legal dp
10 reasons hr legal dp10 reasons hr legal dp
10 reasons hr legal dp
 
Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Arma Slide Deck 17novb09
Arma Slide Deck 17novb09
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
What SMEs can learn from the BA data breach
What SMEs can learn from the BA data breachWhat SMEs can learn from the BA data breach
What SMEs can learn from the BA data breach
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Essay Sos Reviews
Essay Sos ReviewsEssay Sos Reviews
Essay Sos Reviews
 

Best practices for long-term digital archiving

  • 1. Best Practices for Long Term Digital Archival In the beginning there was a stone and a tablet… Peter Mojica VP, Product Strategy, Mgmt AXS-One Inc. www.axsone.com
  • 2. a day in the life…
  • 7. A few hours later A few hours later
  • 10. S S Super CIO
  • 12. CIO is sweating Hold On!
  • 14. CIO
  • 16. 32 Days Later 32 Days Later
  • 17. Found the MEMO yawn Finally, I can go home
  • 19. MEMO Subject: Hmmm??? Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction
  • 20. Don’t Go No, not again!
  • 21. MEMO Subject: Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transaction
  • 22. 73 Days Later 73 Days Later
  • 23. I should’ve considered the bigger picture… CIO on the run. . . c’ya CIO on the run. . . c’ya I should’ve considered the bigger picture… CIO CIO CIO CIO
  • 24.
  • 25. May 2005 Mar 2007                                                                           Print this article Close This Window Morgan Stanley case highlights e-mail perils Fri May 20, 2005 5:45 PM BST By Michael Christie MIAMI (Reuters) - The $1.45 billion judgement against Morgan Stanley for deceiving billionaire Ronald Perelman over a business deal has a lesson all companies should learn -- keeping e-mails is now a must, experts say . Banks and broker-dealers are obliged to retain e-mail and instant messaging documents for three years under U.S. Securities and Exchange Commission rules. But similar requirements will apply to all public companies from July 2006 under the Sarbanes-Oxley corporate reform measures. At the same time, U.S. courts are imposing increasingly harsh punishments on corporations that fail to comply with orders to produce e-mail documents, the experts said . Where judges once were more likely to accept that incompetence or computer problems might be to blame, they are now apt to rule that non-compliance is an indication a company has something to hide. &quot;Morgan Stanley is going to be a harbinger,&quot; said Bill Lyons, chief executive officer of AXS-One Inc. <AXO.A>, a provider of records retention software systems. &quot;I think general counsels around the world are going to look at this as a legal Chernobyl .“ Wednesday's $1.45 billion verdict against Morgan Stanley in West Palm Beach, Florida, was the product of just such a negative ruling on e-mail retention, which is also expected to form the backbone of the Wall Street firm's appeal. Circuit Court Judge Elizabeth Maass, frustrated at Morgan Stanley's repeated failure to provide Perelman's attorneys with e-mails, handed down a pretrial ruling that effectively found the bank had conspired to defraud Perelman when he sold Coleman Co. to appliance maker Sunbeam Corp. in 1998. Morgan Stanley was working for Sunbeam, which entered bankruptcy in 2001, rendering worthless the shares Perelman had received in part payment for Coleman. In a rare step, Maass switched the burden of proof to Morgan Stanley, and instructed the jury solely to decide whether Perelman had relied on Morgan Stanley. Morgan Stanley says that ruling denied it a fair trial. But Eric Rosenberg, a former litigator with Merrill Lynch and now president of e-mail policy consultants LitigationProofing, said Maass was within her rights to rule as she did and could have even taken a more drastic step of issuing a default judgement and taking the verdict out of the jury's hands. Other cases have also resulted in rulings on e-mails. Last July, U.S. District Judge Shira Scheindlin found that Swiss bank UBS <UBSN.VX> had willfully destroyed potential e-mail evidence in a sex discrimination case brought by equity saleswoman Laura Zubulake. The judge ordered UBS to pay Zubulake's costs, and a jury later awarded her $29.2 million. Experts said e-mail retention could be a double-edged sword if not accompanied by corresponding training for employees on the legal implications of e-mails they send. When New York Attorney General Eliot Spitzer investigated the research divisions of Wall Street firms five years ago, he fined Morgan Stanley a little under $10 million for not having a proper e-mail retention policy in place. Merrill Lynch, however, which did have good backup systems and was able to produce relevant e-mails, had to pay over $100 million because some e-mails contained compromising material. &quot;I guess I would put it as 'no good deed went unpunished',&quot; said former Merrill Lynch counsel Rosenberg. Jay Ritter, a professor of finance at the University of Florida, said a danger was that among millions of legitimate e-mails, investigators might find one flippant comment from a low-level manager and take it as reflecting company policy. &quot;There's a reason why certain people, why lawyers like to talk on the phone rather than have any written record of conversations,&quot; Ritter said.
  • 26.
  • 27.
  • 29. further industry consolidation is inevitable Message Management Legal Response Software Storage technologies Backup Recovery Archival technologies Records Management Document Management Search technologies Business Intelligence Hygiene Anti-Virus
  • 30. so why is this so hard?
  • 31.
  • 32.
  • 33.
  • 34. The Industry for Archival As it relates to our long term digital records management of ESI What Do Canals and Railroads Have in Common With the Archival and Compliance Industry ? * Andy Grove, Intel CEO conference 2001 I recently heard Andy Grove, of Intel, say &quot;The convergence of computers, telephones, and cable TV is like water meeting land - new life forms are likely to be created .&quot; TIME
  • 35.
  • 36. Is this the problem? if yes, then we are spending 100% of our time to solve a very small percentage of the problem the reality is that companies trust their employees and most all employees do the right thing, trust is not the issue
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.

Editor's Notes

  1. Andy Grove of Intel says that there have been three great stories of the introduction of technology in ways that have transformed the economy, that have led to boom and bust cycles. One is canals, late 18th century, early 19th century, brought down the price of coal 85% in a very, very short period of time. About 100 years later, railroads entered into not just consciousness but into the economy in England and the United States. And now, the Internet. Well, canals were funded with public money in many places. It was usually a municipal or state enterprise to build a canal. The railroads in the United States were funded in significant part by the gift of one-tenth of the public property of America to about 37 separate companies in order to incentivise them to build railroads. Those are the rights of way that they owned for many, many years and ended up giving away to immigrants in order to put customers out there where they were building the railroads. So, the notion that politics or policy, the legal culture, however you want to define it, the notion that shapes and creates opportunity, that&apos;s as old as there was ever technology. Convergence: Business and Technology