Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Six years ago, I.T.’s main source of truth when it came
to legal and compliance rested in email servers. These
days, work ...
Upcoming SlideShare
Loading in …5
×

Getting a clue: uncovering the truth about your data with mobile forensics

1,311 views

Published on

Where is your data going? Where is it stored?

Published in: Technology
  • Be the first to comment

Getting a clue: uncovering the truth about your data with mobile forensics

  1. 1. Six years ago, I.T.’s main source of truth when it came to legal and compliance rested in email servers. These days, work communications have evolved and are not limited to just laptops. They have burst on the scene with text, instant messaging, and mobile sharing apps. Where is your data going? Where is it stored? • Where is the backed-up data stored? • What are our retention and archival policies? • How is the company currently backing up the data stored on laptops, desktops and mobile devices (a.k.a. endpoints)? • Which devices — Windows, Mac, iOS, Android, Linux, etc. — are in use? • How do we manage data belonging to ex-employees? • How does our existing software handle and implement data privacy and confidentiality policies? • Can we collect and preserve deleted messages? • How can I monitor messaging communications on mobile devices for adherence to regulatory mandates or internal compliance policies? • Give Legal information about the company’s data assets • Educate Legal on all the software I.T. uses to manage data • Look for opportunities for I.T. to identify and collect data that can facilitate repeatable collections and reduce spoilage risk • Involve Legal early in the process while evaluating data-protection software that enables eDiscovery • Enable access to advanced audit capabilities that ensures full chain of custody • Choose software that helps Legal do its own data retrieval Druva is the only company in the data protection space that enables companies to grab 100% of data off mobile devices. Learn more at - Gibson Dunn, “2015 Mid-Year E-Discovery Update”, http://www.gibsondunn.com/publications/Pages/2015-Mid-Year-E-Discovery-Update.aspx - RingCentral, “Big changes in business communications”, https://blog.ringcentral.com/2013/03/infographic-big-changes-in-business-communications/ - Smarsh, “2015 Electronic Communications Compliance Survey Report” http://www.smarsh.com/whitepapers/2015-electronic-communications-compliance-survey-report of business users use text messaging for business communications. Those text messages can pose a significant risk. 79% of those that allowed text messaging had minimal or no confidence in their ability to produce messages if requested. 60% reason digital communications data is leveraged Outside of audits, litigation and e-discovery requests are the #1 GETTING A CLUE: UNCOVERING THE TRUTH ABOUT YOUR DATA WITH MOBILE FORENSICS STANDARD QUESTIONS LEGAL HAS FOR I.T. DURING DISCOVERY OF DATA: Enterprise I.T. can play a critical role in creating a plan to address the mobile eDiscovery risks. WITH MOBILE FORENSICS, I.T. CAN: Texts and instant messages are increasingly at issue in investigations and litigation. But extracting them from mobile devices can be expensive and time consuming, if possible at all.” druva.com/proactivecompliance - Gibson Dunn “2015 Mid-Year E-Discovery Update” SMS SMS SMS SMS SMS SMS SMS SMS SMS SMS I think I left my laptop a tthebardang it LO L I had so many important files on there There’s a package at my desk t hatdidn’thavemynam e on it but I opened it anywa y.Guess Se e you at the restaurant at 7:30. Bring your laptop w it h you, I want to discuss the deal Do you know the password to the NAS drive? Need to access some impo I’ m not supposed to say anything but Bob is getting fired for a Sources:

×