SlideShare a Scribd company logo
1 of 19
e-Discovery
Agenda
• Computer Forensics Vs e-Discovery
• Case-studies
• Terminology
• EDRM ( Electronic Discovery Reference Model)
Speaker’s Profile
MALLA REDDY DONAPATI
Security Enthusiast, Forensicator and Trainer
M.Sc Information Security & Computer Forensics
dmred1
http://infoseclabs.blogspot.in/
e-Discovery
“ Electronic discovery (also called e-discovery or ediscovery) refers to any process in
which electronic data is sought, located, secured, and searched with the intent of using
it as evidence in a civil or criminal legal case”
Data are identified as potentially relevant by attorneys and placed on legal hold.
Evidence is then extracted and analyzed using digital forensic procedures, and is
reviewed using a document review platform. Documents can be reviewed either as
native files or after a conversion to PDF or TIFF form. A document review platform is
useful for its ability to aggregate and search large quantities of ESI.
Why e-Discovery ?
• 90 % documents created today are in electronic format
• 90 billion or above the number of business emails sent and received each day
• majority of information these days is electronic and can potentially be sought as
evidence in a court of law
• Additionally, with the sheer amount of data available and regulatory and legal
compliance requirements continuing to evolve, organizations face new challenges
when it comes to information retention and governance.
e-Discovery
• The primary focus of standard e-
discovery is the collection of active
data and metadata from multiple
hard drives and other storage
media. Litigation can be supported by
active data (information readily
available to the user, such as e-mail,
electronic calendars, word processing
files, and databases), or by metadata
(that which tells us about the
document’s author, time of creation,
source, and history)
Computer Forensics
• The goal of computer forensics is to
conduct an autopsy of a computer
hard drive – searching hidden folders
and unallocated disk space to identify
the who, what, where, when, and
why from a computer. A significant
amount of evidence is not readily
accessible on a computer; when this
occurs, a computer forensic
examination is necessary
Bank of America fined $10 million, 2004
Following an investigation into trading by Bank of America and a former employee, the SEC
(Securities and Exchange Commission) ordered Bank of America to pay a fine of $10 million after
they “repeatedly failed to promptly furnish” email and gave “misinformation”
Coleman Holdings v. Morgan Stanley, 2005
Morgan Stanley was ordered to pay over $800 million in damages when they repeatedly failed to
produce emails in a timely manner. The judge in this case stated that “efforts to hide its emails”
were evidence of “guilt”.
Terminology
• ESI (Electronically Stored Information)
• Custodian
• Harvesting
• De-duplication
• Metadata
• Spoliation
• Legal Hold
• Document Retention Policy
ESI – Electronically Stored Information
What forms ESI Take ?
• Text based - .doc .pdf .txt .wpd .xls .ppt .html
• Images - .bpm .gif .jpg .tiff
• Moving Images - .avi .mov .flv .mpeg .swf .wmv
• Sound - .au .mp3 .mp4 .ra .wav .wma
• Web Archive - .ar .mhtml .warc
• Email - .pst .ost .msg .dbx .eml .mht
Data and Metadata
• Data – content of an email or document
• Metadata – encompasses all the information about a document that is not visible to
the user
• ESI Created
• ESI modified
• Custodian
• To, From, CC, BCC
• Date & Time email was sent
• Subject
• Date or Time received
EDRM
EDRM ..
• Identification
• Locating potential sources of ESI & determining it’s scope, breadth and depth
• Preservation
• Ensuring that ESI is protected against inappropriate alteration & destruction
• Collection
• Acquisition of ESI from computers, servers, etc. for further processing and reviewing it for
anticipated litigation or government investigation
EDRM . .
• Processing
• Involves pre-processing to reduce large sets of collected ESI for further review, production
and subsequent use
• DNISTing
• De-duplication (removing duplicate ESI)
• Filtering by key word
• Data or metadata extraction
• Reducing the volume of ESI and converting it, if necessary, to forms more suitable for
review & analysis.
• Review
• Evaluating ESI for further relevance and privilege
• Review
• Evaluating ESI for further relevance and
privilege with or without technology
assisted review platforms
EDRM. .
• Analysis
• Evaluating ESI for content, context including
patterns, topics people and discussion
• Production
• Delivering ESI to others in appropriate forms
& using appropriate delivery mechanisms
Presentation
• Displaying ESI before audiences (at depositions,
hearings, trials, etc.), especially in native &
near-native forms, to elicit further information,
validate existing facts or positions, or persuade
an audience.
E discovery mallareddy 20160213

More Related Content

What's hot

Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Information Storage and Retrieval : A Case Study
Information Storage and Retrieval : A Case StudyInformation Storage and Retrieval : A Case Study
Information Storage and Retrieval : A Case StudyBhojaraju Gunjal
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.Lanujessy
 
Information storage and retrieval
Information storage and retrievalInformation storage and retrieval
Information storage and retrievalSadaf Rafiq
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Information retrieval
Information retrievalInformation retrieval
Information retrievalhplap
 
Unit 3 - Storage & Retrieval of Information
Unit 3 - Storage & Retrieval of InformationUnit 3 - Storage & Retrieval of Information
Unit 3 - Storage & Retrieval of InformationRobbieA
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mark Conrad
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIDr. Rupak Chakravarty
 
INFORMATION STORAGE AND RETRIEVAL
INFORMATION STORAGE AND RETRIEVALINFORMATION STORAGE AND RETRIEVAL
INFORMATION STORAGE AND RETRIEVALjay panchal
 
Web search vs ir
Web search vs irWeb search vs ir
Web search vs irPrimya Tamil
 
Information storage and retrieval
Information storage and  retrievalInformation storage and  retrieval
Information storage and retrievalDr. Utpal Das
 
Privacy and Libraries
Privacy and LibrariesPrivacy and Libraries
Privacy and LibrariesBradley Shipps
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 

What's hot (20)

Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Law Firm Technology: Then and Now
Law Firm Technology: Then and NowLaw Firm Technology: Then and Now
Law Firm Technology: Then and Now
 
Information Storage and Retrieval : A Case Study
Information Storage and Retrieval : A Case StudyInformation Storage and Retrieval : A Case Study
Information Storage and Retrieval : A Case Study
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
Information storage and retrieval
Information storage and retrievalInformation storage and retrieval
Information storage and retrieval
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Presentation1
Presentation1Presentation1
Presentation1
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Information retrieval
Information retrievalInformation retrieval
Information retrieval
 
Unit 3 - Storage & Retrieval of Information
Unit 3 - Storage & Retrieval of InformationUnit 3 - Storage & Retrieval of Information
Unit 3 - Storage & Retrieval of Information
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - II
 
INFORMATION STORAGE AND RETRIEVAL
INFORMATION STORAGE AND RETRIEVALINFORMATION STORAGE AND RETRIEVAL
INFORMATION STORAGE AND RETRIEVAL
 
Web search vs ir
Web search vs irWeb search vs ir
Web search vs ir
 
Information storage and retrieval
Information storage and  retrievalInformation storage and  retrieval
Information storage and retrieval
 
Privacy and Libraries
Privacy and LibrariesPrivacy and Libraries
Privacy and Libraries
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
Sujit
SujitSujit
Sujit
 

Viewers also liked

Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Buffer overflow null
Buffer overflow nullBuffer overflow null
Buffer overflow nullnullowaspmumbai
 
Ganesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsGanesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsnullowaspmumbai
 
Middleware hacking
Middleware hackingMiddleware hacking
Middleware hackingnullowaspmumbai
 
Drozer - An Android Application Security Tool
Drozer - An Android Application Security Tool Drozer - An Android Application Security Tool
Drozer - An Android Application Security Tool nullowaspmumbai
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskarnullowaspmumbai
 
Null Mumbai 14th May News bytes by Dhawal Shah
Null Mumbai 14th May News bytes by Dhawal ShahNull Mumbai 14th May News bytes by Dhawal Shah
Null Mumbai 14th May News bytes by Dhawal Shahnullowaspmumbai
 
Kumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securityKumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
 
Fuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 JuneFuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 Junenullowaspmumbai
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Dasnullowaspmumbai
 
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad SarangNull Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarangnullowaspmumbai
 
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shahNull 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shahnullowaspmumbai
 

Viewers also liked (15)

Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Buffer overflow null
Buffer overflow nullBuffer overflow null
Buffer overflow null
 
Ganesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsGanesh naik linux_kernel_internals
Ganesh naik linux_kernel_internals
 
Middleware hacking
Middleware hackingMiddleware hacking
Middleware hacking
 
Drozer - An Android Application Security Tool
Drozer - An Android Application Security Tool Drozer - An Android Application Security Tool
Drozer - An Android Application Security Tool
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 
Null Mumbai 14th May News bytes by Dhawal Shah
Null Mumbai 14th May News bytes by Dhawal ShahNull Mumbai 14th May News bytes by Dhawal Shah
Null Mumbai 14th May News bytes by Dhawal Shah
 
Kumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication securityKumar gunjan 20160213 mobile communication security
Kumar gunjan 20160213 mobile communication security
 
Fuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 JuneFuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 June
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
Dll Hijacking
Dll Hijacking Dll Hijacking
Dll Hijacking
 
Abusing Target
Abusing Target Abusing Target
Abusing Target
 
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad SarangNull Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
 
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shahNull 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
 

Similar to E discovery mallareddy 20160213

Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesKathirvel Ayyaswamy
 
e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?Keisha-Ann Thompson
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsNicholas Davis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsNicholas Davis
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
Data Mining in Operating System
Data Mining in Operating SystemData Mining in Operating System
Data Mining in Operating SystemITz_1
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011eamonnsfl
 
AZ to eDiscovery
AZ to eDiscoveryAZ to eDiscovery
AZ to eDiscoveryeamonnsfl
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalShawn J. Roberts
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallJ. David Morris
 

Similar to E discovery mallareddy 20160213 (20)

s07_bhavesh_ppt
s07_bhavesh_ppts07_bhavesh_ppt
s07_bhavesh_ppt
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Unit 2 tk-technology in business research - thulasi krishna
Unit 2 tk-technology in business research - thulasi krishnaUnit 2 tk-technology in business research - thulasi krishna
Unit 2 tk-technology in business research - thulasi krishna
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Data Mining in Operating System
Data Mining in Operating SystemData Mining in Operating System
Data Mining in Operating System
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011eDiscovery A-Z - June 2011
eDiscovery A-Z - June 2011
 
AZ to eDiscovery
AZ to eDiscoveryAZ to eDiscovery
AZ to eDiscovery
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal Professional
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 

More from nullowaspmumbai

ELK in Security Analytics
ELK in Security Analytics ELK in Security Analytics
ELK in Security Analytics nullowaspmumbai
 
Radio hacking - Part 1
Radio hacking - Part 1 Radio hacking - Part 1
Radio hacking - Part 1 nullowaspmumbai
 
How I got my First CVE
How I got my First CVE How I got my First CVE
How I got my First CVE nullowaspmumbai
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management nullowaspmumbai
 
Middleware hacking
Middleware hackingMiddleware hacking
Middleware hackingnullowaspmumbai
 
Internet censorship circumvention techniques
Internet censorship circumvention techniquesInternet censorship circumvention techniques
Internet censorship circumvention techniquesnullowaspmumbai
 
How i got my first cve
How i got my first cveHow i got my first cve
How i got my first cvenullowaspmumbai
 
Adversarial machine learning updated
Adversarial machine learning updatedAdversarial machine learning updated
Adversarial machine learning updatednullowaspmumbai
 
Adversarial machine learning
Adversarial machine learning Adversarial machine learning
Adversarial machine learning nullowaspmumbai
 

More from nullowaspmumbai (13)

Xxe
XxeXxe
Xxe
 
ELK in Security Analytics
ELK in Security Analytics ELK in Security Analytics
ELK in Security Analytics
 
Switch security
Switch securitySwitch security
Switch security
 
Radio hacking - Part 1
Radio hacking - Part 1 Radio hacking - Part 1
Radio hacking - Part 1
 
How I got my First CVE
How I got my First CVE How I got my First CVE
How I got my First CVE
 
Power forensics
Power forensicsPower forensics
Power forensics
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Middleware hacking
Middleware hackingMiddleware hacking
Middleware hacking
 
Internet censorship circumvention techniques
Internet censorship circumvention techniquesInternet censorship circumvention techniques
Internet censorship circumvention techniques
 
How i got my first cve
How i got my first cveHow i got my first cve
How i got my first cve
 
Adversarial machine learning updated
Adversarial machine learning updatedAdversarial machine learning updated
Adversarial machine learning updated
 
Commix
Commix Commix
Commix
 
Adversarial machine learning
Adversarial machine learning Adversarial machine learning
Adversarial machine learning
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo GarcĂ­a Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

E discovery mallareddy 20160213

  • 2. Agenda • Computer Forensics Vs e-Discovery • Case-studies • Terminology • EDRM ( Electronic Discovery Reference Model)
  • 3. Speaker’s Profile MALLA REDDY DONAPATI Security Enthusiast, Forensicator and Trainer M.Sc Information Security & Computer Forensics dmred1 http://infoseclabs.blogspot.in/
  • 4. e-Discovery “ Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case” Data are identified as potentially relevant by attorneys and placed on legal hold. Evidence is then extracted and analyzed using digital forensic procedures, and is reviewed using a document review platform. Documents can be reviewed either as native files or after a conversion to PDF or TIFF form. A document review platform is useful for its ability to aggregate and search large quantities of ESI.
  • 5. Why e-Discovery ? • 90 % documents created today are in electronic format • 90 billion or above the number of business emails sent and received each day • majority of information these days is electronic and can potentially be sought as evidence in a court of law • Additionally, with the sheer amount of data available and regulatory and legal compliance requirements continuing to evolve, organizations face new challenges when it comes to information retention and governance.
  • 6. e-Discovery • The primary focus of standard e- discovery is the collection of active data and metadata from multiple hard drives and other storage media. Litigation can be supported by active data (information readily available to the user, such as e-mail, electronic calendars, word processing files, and databases), or by metadata (that which tells us about the document’s author, time of creation, source, and history) Computer Forensics • The goal of computer forensics is to conduct an autopsy of a computer hard drive – searching hidden folders and unallocated disk space to identify the who, what, where, when, and why from a computer. A significant amount of evidence is not readily accessible on a computer; when this occurs, a computer forensic examination is necessary
  • 7. Bank of America fined $10 million, 2004 Following an investigation into trading by Bank of America and a former employee, the SEC (Securities and Exchange Commission) ordered Bank of America to pay a fine of $10 million after they “repeatedly failed to promptly furnish” email and gave “misinformation” Coleman Holdings v. Morgan Stanley, 2005 Morgan Stanley was ordered to pay over $800 million in damages when they repeatedly failed to produce emails in a timely manner. The judge in this case stated that “efforts to hide its emails” were evidence of “guilt”.
  • 8. Terminology • ESI (Electronically Stored Information) • Custodian • Harvesting • De-duplication • Metadata • Spoliation • Legal Hold • Document Retention Policy
  • 9. ESI – Electronically Stored Information
  • 10. What forms ESI Take ? • Text based - .doc .pdf .txt .wpd .xls .ppt .html • Images - .bpm .gif .jpg .tiff • Moving Images - .avi .mov .flv .mpeg .swf .wmv • Sound - .au .mp3 .mp4 .ra .wav .wma • Web Archive - .ar .mhtml .warc • Email - .pst .ost .msg .dbx .eml .mht
  • 11. Data and Metadata • Data – content of an email or document • Metadata – encompasses all the information about a document that is not visible to the user • ESI Created • ESI modified • Custodian • To, From, CC, BCC • Date & Time email was sent • Subject • Date or Time received
  • 12. EDRM
  • 13.
  • 14. EDRM .. • Identification • Locating potential sources of ESI & determining it’s scope, breadth and depth • Preservation • Ensuring that ESI is protected against inappropriate alteration & destruction • Collection • Acquisition of ESI from computers, servers, etc. for further processing and reviewing it for anticipated litigation or government investigation
  • 15. EDRM . . • Processing • Involves pre-processing to reduce large sets of collected ESI for further review, production and subsequent use • DNISTing • De-duplication (removing duplicate ESI) • Filtering by key word • Data or metadata extraction • Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review & analysis. • Review • Evaluating ESI for further relevance and privilege
  • 16. • Review • Evaluating ESI for further relevance and privilege with or without technology assisted review platforms
  • 17. EDRM. . • Analysis • Evaluating ESI for content, context including patterns, topics people and discussion • Production • Delivering ESI to others in appropriate forms & using appropriate delivery mechanisms
  • 18. Presentation • Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native & near-native forms, to elicit further information, validate existing facts or positions, or persuade an audience.