SlideShare a Scribd company logo
Information Retention and eDiscovery
Survey
Global Results
Methodology
• Survey performed by ReRez
• 500 global organizations
  – 4 countries
    • United States   200
    • Canada          100
    • United Kingdom 100
    • Germany         100
• Cross-industry




                              2
Key Findings
• Number of companies with no retention policy cut in half
• ESI requests fail a third of the time, with consequences
• No improvement in gap between retention beliefs & practices
• Majority impacted by data privacy laws & regulations
• Inefficient backups still used for archiving & legal holds
Number of companies with no retention policy cut in half
• 60% of organizations have a
  formal retention plan at various
  stages
• Only 34% or organizations report
  that their plan is fully operational
  – 26% are still at various stages of
    implementing
  – A third (33%) were only discussing
    in 2012; 30% in 2011
  – 7% reported no plans in 2012; 14%
    in 2011
ESI requests fail a third of the time, with consequences
• Requests completely or partially
  fail 31% of the time
  – Ability to make timely decisions
    significantly up from 26% in 2011
• Organizations responded to
  requests 17 times in past year
• 44% don’t rate their
  preparedness as
  somewhat/extremely confident
• 75% say they are less than
  ‘extremely responsive’
No improvement in gap between retention beliefs & practices
• 81% say proper information
  retention allows organizations
  to delete information
• However, 42% of backups are
  indefinitely retained
• Organizations often delete
  without considering retention
  policies
Majority impacted by data privacy laws & regulations
• 53% say laws and/or regulations impact archiving and eDiscovery initiatives
Inefficient backups still used for archiving & legal holds
• 38% of data is not
  needed/shouldn't be kept in
  backup
• But 85% of organizations
  routinely perform legal holds in
  backups
• 34% of backup data unnecessary
  due to litigation risk
• 56% of organizations say backup
  storage is used for infinite
  retention dedicated to legal hold
Recommendations
• Adopt a defensible deletion mindset
• Err on the side of fewer, rather than many, retention policies
• Automate privacy, retention and compliance policies to reduce risk
• Implement a solution in which legal holds can override expiry policies
• Don't use backups for long term retention

More Related Content

What's hot

Lamarche Models And Outcomes
Lamarche Models And OutcomesLamarche Models And Outcomes
Lamarche Models And Outcomesprimary
 
Analytics Across the Healthcare Ecosytem
Analytics Across the Healthcare EcosytemAnalytics Across the Healthcare Ecosytem
Analytics Across the Healthcare Ecosytem
IBM in Healthcare
 
Reinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovationReinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovation
IBM in Healthcare
 
Grand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits LandscapeGrand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits Landscape
Grand Rounds
 
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder CollaborationThe State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
Veeva Systems
 
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits StrategyNetwork Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Grand Rounds
 
Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018
MD Ranger, Inc.
 
An IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the CloudAn IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the Cloud
IBM in Healthcare
 
Your cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and workYour cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and work
IBM in Healthcare
 
The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...
IBM in Healthcare
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the Cloud
IBM in Healthcare
 
Saving money by doing the right thing
Saving money by doing the right thingSaving money by doing the right thing
Saving money by doing the right thing
NCVO - National Council for Voluntary Organisations
 
Monday 6 troels bierman mortensen daintel
Monday 6 troels bierman mortensen   daintelMonday 6 troels bierman mortensen   daintel
Monday 6 troels bierman mortensen daintelMichiel Stoffels
 
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
Bill Kelly
 
ScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&DScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&D
BIOVIA
 
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle
 
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012Gigaom
 
Streamlining Study Start-up
Streamlining Study Start-upStreamlining Study Start-up
Streamlining Study Start-up
Veeva Systems
 
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
L.E.K. Consulting
 
Collaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical TrialsCollaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical Trials
Veeva Systems
 

What's hot (20)

Lamarche Models And Outcomes
Lamarche Models And OutcomesLamarche Models And Outcomes
Lamarche Models And Outcomes
 
Analytics Across the Healthcare Ecosytem
Analytics Across the Healthcare EcosytemAnalytics Across the Healthcare Ecosytem
Analytics Across the Healthcare Ecosytem
 
Reinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovationReinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovation
 
Grand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits LandscapeGrand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits Landscape
 
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder CollaborationThe State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
 
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits StrategyNetwork Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
 
Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018
 
An IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the CloudAn IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the Cloud
 
Your cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and workYour cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and work
 
The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the Cloud
 
Saving money by doing the right thing
Saving money by doing the right thingSaving money by doing the right thing
Saving money by doing the right thing
 
Monday 6 troels bierman mortensen daintel
Monday 6 troels bierman mortensen   daintelMonday 6 troels bierman mortensen   daintel
Monday 6 troels bierman mortensen daintel
 
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
 
ScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&DScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&D
 
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
 
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
 
Streamlining Study Start-up
Streamlining Study Start-upStreamlining Study Start-up
Streamlining Study Start-up
 
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
 
Collaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical TrialsCollaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical Trials
 

Viewers also liked

Los ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXILos ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXI
Demys Lara
 
Making my magazine double page spread
Making my magazine double page spreadMaking my magazine double page spread
Making my magazine double page spread
lucyyylouuuuu123
 
Health Stations @ Retail Pharmacies
Health Stations @ Retail PharmaciesHealth Stations @ Retail Pharmacies
Health Stations @ Retail Pharmacies
Rohit Chohan
 
11 Sac H2 H0210
11 Sac H2 H021011 Sac H2 H0210
11 Sac H2 H0210pfeigle
 
Famine ghost ppt2
Famine ghost ppt2Famine ghost ppt2
Famine ghost ppt2
Jack O'Keefe
 
Si ee 8 de marzo
Si ee 8 de marzoSi ee 8 de marzo
Si ee 8 de marzo
sbmalambo
 
4b03 matematica
4b03 matematica4b03 matematica
4b03 matematicajimena-p
 
The best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAEThe best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAE
Al Manara Pharmacy
 
Presentación2
Presentación2Presentación2
Presentación2
mcbrayan
 
Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017
Roderick Baturi Ramos
 
Моя Клумба
Моя КлумбаМоя Клумба
Моя Клумба
MyKlu
 

Viewers also liked (13)

Los ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXILos ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXI
 
Making my magazine double page spread
Making my magazine double page spreadMaking my magazine double page spread
Making my magazine double page spread
 
Health Stations @ Retail Pharmacies
Health Stations @ Retail PharmaciesHealth Stations @ Retail Pharmacies
Health Stations @ Retail Pharmacies
 
11 Sac H2 H0210
11 Sac H2 H021011 Sac H2 H0210
11 Sac H2 H0210
 
Famine ghost ppt2
Famine ghost ppt2Famine ghost ppt2
Famine ghost ppt2
 
Si ee 8 de marzo
Si ee 8 de marzoSi ee 8 de marzo
Si ee 8 de marzo
 
4b03 matematica
4b03 matematica4b03 matematica
4b03 matematica
 
1997 - General Assembly resolution on Policies and Programmes Involving Youth...
1997 - General Assembly resolution on Policies and Programmes Involving Youth...1997 - General Assembly resolution on Policies and Programmes Involving Youth...
1997 - General Assembly resolution on Policies and Programmes Involving Youth...
 
The best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAEThe best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAE
 
Teen suicide
Teen suicideTeen suicide
Teen suicide
 
Presentación2
Presentación2Presentación2
Presentación2
 
Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017
 
Моя Клумба
Моя КлумбаМоя Клумба
Моя Клумба
 

Similar to 2012 Information Retention and eDiscovery Survey Global Results

Symantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global ResultsSymantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global Results
Symantec
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Blancco
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
Case IQ
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
Symantec
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspective
TGA Australia
 
The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014
Jason Hong
 
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...Mary Bennett
 
Poor processes put patient data at risk
Poor processes put patient data at riskPoor processes put patient data at risk
Poor processes put patient data at risk
CureMD
 
Compliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging RegulationCompliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging Regulation
MediaPost
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective
Intralinks
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
Jesse Wilkins
 
Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe
Integrity Management Services, Inc.
 
eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?
Health Informatics New Zealand
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 Webinar
Concept Searching, Inc
 
Tips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower HotlineTips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower Hotline
Case IQ
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt
20214Mohan
 
Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS
HIMSS UK
 
The Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data GovernanceThe Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data Governance
Health Catalyst
 

Similar to 2012 Information Retention and eDiscovery Survey Global Results (20)

Symantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global ResultsSymantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global Results
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspective
 
The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014
 
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
 
Poor processes put patient data at risk
Poor processes put patient data at riskPoor processes put patient data at risk
Poor processes put patient data at risk
 
MRDB 7
MRDB 7MRDB 7
MRDB 7
 
Compliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging RegulationCompliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging Regulation
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
 
Survey Report
Survey ReportSurvey Report
Survey Report
 
Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe
 
eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 Webinar
 
Tips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower HotlineTips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower Hotline
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt
 
Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS
 
The Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data GovernanceThe Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data Governance
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

2012 Information Retention and eDiscovery Survey Global Results

  • 1. Information Retention and eDiscovery Survey Global Results
  • 2. Methodology • Survey performed by ReRez • 500 global organizations – 4 countries • United States 200 • Canada 100 • United Kingdom 100 • Germany 100 • Cross-industry 2
  • 3. Key Findings • Number of companies with no retention policy cut in half • ESI requests fail a third of the time, with consequences • No improvement in gap between retention beliefs & practices • Majority impacted by data privacy laws & regulations • Inefficient backups still used for archiving & legal holds
  • 4. Number of companies with no retention policy cut in half • 60% of organizations have a formal retention plan at various stages • Only 34% or organizations report that their plan is fully operational – 26% are still at various stages of implementing – A third (33%) were only discussing in 2012; 30% in 2011 – 7% reported no plans in 2012; 14% in 2011
  • 5. ESI requests fail a third of the time, with consequences • Requests completely or partially fail 31% of the time – Ability to make timely decisions significantly up from 26% in 2011 • Organizations responded to requests 17 times in past year • 44% don’t rate their preparedness as somewhat/extremely confident • 75% say they are less than ‘extremely responsive’
  • 6. No improvement in gap between retention beliefs & practices • 81% say proper information retention allows organizations to delete information • However, 42% of backups are indefinitely retained • Organizations often delete without considering retention policies
  • 7. Majority impacted by data privacy laws & regulations • 53% say laws and/or regulations impact archiving and eDiscovery initiatives
  • 8. Inefficient backups still used for archiving & legal holds • 38% of data is not needed/shouldn't be kept in backup • But 85% of organizations routinely perform legal holds in backups • 34% of backup data unnecessary due to litigation risk • 56% of organizations say backup storage is used for infinite retention dedicated to legal hold
  • 9. Recommendations • Adopt a defensible deletion mindset • Err on the side of fewer, rather than many, retention policies • Automate privacy, retention and compliance policies to reduce risk • Implement a solution in which legal holds can override expiry policies • Don't use backups for long term retention