This document discusses how cloud computing can benefit eDiscovery processes. It begins by defining cloud computing and noting that it offers on-demand access to shared computing resources and bills users based on consumption. The document then examines ideal use cases for cloud computing in eDiscovery, including applications with unpredictable workloads and defined portions of complex business processes. It also provides a checklist for determining if aspects of an eDiscovery workflow are well-suited for the cloud. The rest of the document covers additional cloud computing topics as they relate to eDiscovery, such as public vs private clouds, security, compliance, disaster recovery and business continuity.
3. Buy vs. Rent
• Family of four
• Enjoy race car driving
• 28% income tax bracket
4. User and architecture decision
• Complex business process applications that offer no IT
leverage opportunity
5. Running an advertisement?
• Complex business process applications that offer no IT
leverage opportunity
• Business processes with unpredictable workloads
6. Ideal Use Cases for the “Cloud”
• Complex business process applications that offer no IT
leverage opportunity
• Business processes with unpredictable workloads
• A defined portion of the above business processes
11. Obama‟s IT guy embraces the „cloud‟
“Despite spending over $500 billion, we are not
where we need to be. That‟s one of the
reasons why we‟re pushing very, very
aggressively with our shift toward cloud
computing. The reason that‟s really important
is because it helps us cut waste, it lowers the
cost of government operations and at the
same time it improves the service delivery.”
-Federal Chief Information Officer Vivek Kundra
Page 2
14. Application Delivery Comparison
Application
on-premise
•Buy your own machines,
software, connectivity, etc.
•You have complete control
and responsibility
•Up-front capital costs for
the infrastructure
•On-going costs for full-time
employees and
maintenance
Page 5
15. Application Delivery Comparison
Application Application at a
on-premise hoster
•Buy your own machines, •You rent machines,
software, connectivity, etc. software, connectivity, etc.
•You have complete control •Less control but fewer
and responsibility responsibilities
•Up-front capital costs for •Lower capital costs, but
the infrastructure you pay for fixed capacity
•On-going costs for full-time even if idle
employees and
maintenance
Page 6
16. Application Delivery Comparison
Application Application at a Application in the
on-premise hoster Cloud
•Buy your own machines, •You rent machines, •Pay as you go
software, connectivity, etc. software, connectivity, etc. •Shared multi-tenant
•You have complete control •Less control but fewer environment
and responsibility responsibilities •Elastic compute/application
•Up-front capital costs for •Lower capital costs, but power on-demand
the infrastructure you pay for fixed capacity •You have process control,
•On-going costs for full-time even if idle but no infrastructure
employees and responsibility
maintenance •No capital costs or
employee costs
Page 7
17. eDiscovery Cloud Blueprint
Using the Electronic Discovery Reference
Model (EDRM) to frame your initiatives
Cloud vs. On-premise
Public clouds vs. Private Clouds
Security and Compliance
Disaster Recovery and Business Continuity
Page 8
19. Cloud vs. On-premise
Does your budget consider the difference
between capital expense (Cap Ex) versus
operating expense (Op Ex)?
Do you have many outside parties (outside
counsel, contract reviewers, service
providers) who need to access case data?
How quickly do users (outside counsel, expert
witnesses, vendors, etc.) need to be able to
use the system?
Page 11
20. Public clouds vs. Private clouds
Public cloud uses shared hardware, software
and applications that are available to the public
Private cloud uses hardware, software and
applications only for subscribing users
• Deployed by company behind firewall (“Internal
cloud”)
• Deployed by provider in private data center
Who owns the infrastructure (including disk
drives) and where is it located?
Can document retention and data destruction
be certified?
Page 12
21. Security and Compliance
Do provider data centers have SAS-70, Type II
Certification?
Does the provider offer International Safe
Harbor Certification?
Do the provider’s security management
techniques follow ISO 27002 and/or ISO 27001?
Can the provider certify where the data is
stored and where the servers are?
Can the provider certify data destruction?
Page 13
22. Disaster Recovery and Business Continuity
System crashes or natural disasters can
impact not only cloud computing providers,
but also any corporate enterprise or law firm.
Does the provider have enterprise-class
disaster recovery facilities?
Does the provider offer system SLAs? How
well have they historically been met?
• Does the provider publish RPO and RTO?
Does the provider maintain defined Business
Continuity Planning protocols?
Page 14