SlideShare a Scribd company logo
1 of 16
CHAPTER 8
INFORMATION GOVERNANCE
Information Governance & Legal Functions
ITS 833
Dr. Mia Simmons
Chapter Overview
■ This chapter will cover pages 115-145 in
your book.
■ This chapter covers how Legal functions
play a major role into IG.
2
2006 FRCP Procedure
■ Federal Rules of Civil Procedure (FRCP)
– Governed the discovery of evidence in
lawsuits and other civil cases.
– Apply to US district courts
– Amended in 2006 – organizations must
proactively manage the e-discovery process
to avoid sanctions
– Electronically stored Information (ESI) –
digital stored format for data.
3
Revised
FRCP
Rules
4
FRCP 1—Scope and Purpose. This rule is simple
and clear; its aim is to “secure the just, speedy,
and inexpensive determination of every action.
FRCP 16—Pretrial Conferences; Scheduling;
Management . This rule provides guidelines for
preparing for and managing the e-discovery
process; the court expects IT and network literacy
on both sides, so that pretrial conferences
regarding discoverable evidence are productive
FRCP 33—Interrogatories to Parties . This rule
provides a definition of business es records that
are discoverable and the right of opposing parties
to request and access them
E-Discovery Reference Model
5
Create and retain ESI
according to an
enforceable electronic
records retention policy
and electronic records
management (ERM)
program. Enforce the
policy, and monitor
compliance with it and
the ERM program.
Identify the relevant
ESI, preserve any so it
cannot be altered or
destroyed, and collect
all ESI for further
review.
Process and filter the
ESI to remove the
excess and duplicates.
You reduce costs by
reducing the volume of
ESI that moves to the
next stage in the e-
discovery process.
Review and analyze the
filtered ESI for privilege
because privileged ESI
is not discoverable,
unless some exception
kicks in.
Produce the remaining
ESI, after filtering out
what’s irrelevant,
duplicated, or
privileged. Producing
ESI in native format is
common.
Clawback the ESI that
you disclosed to the
opposing party that you
should have filtered
out, but did not.
Clawback is not
unusual, but you have
to work at getting
clawback approved,
and the court may deny
it.
Present at trial if your
case hasn’t settled.
Judges have little to no
patience with lawyers
who appear before
them not understanding
e-discovery and the ESI
of their clients or the
opposing side.
6
E-Discovery Reference Model
E-Discovery Reference Model
■ Model is a planning tool that presents key e-discovery process
steps.
■ Guidelines
– Implement an IG program
– Inventory your ESI
– Create & implement a comprehensive records retention policy,
and
also include an e-mail retention policy and retention schedules
for
major ESI areas.
– As an extension of your retention policy, implement a legal
bold
policy that is enforceable, auditable, and legally defensive.
– Leverage technology
– Develop and execute your e-discovery plant.
7
Intersection of IG and E-Discovery
■ Barry Murphy stated:
– Effective IG programs can alleviate e-discovery headaches by
reducing the amount of information to process and review,
allowing legal teams to get to the facts of a case quickly and
efficiently, and can even result in better case outcomes.
■ Legal Hold Process
– formal system of polices, processes, and controls is put in
place to
notify key employees of a civil lawsuit (or impending one) and
the
set of documents that must put on legal hold.
8
INTERSECTION
OF IG AND E-
DISCOVERY
9
Intersection of IG and E-Discovery
■ Kick-Start Legal Hold
– 3 basic steps
1. Define requirements.
2. Define the ideal process.
3. Select the technology.
■ IG & E-Discovery Readiness
– Establish a culture that both values information and
recognizes
the risks inherent in it.
– Create a truly cross-functional IG team
– Use e-discovery as an IG proof of concept
– Measure ROI on more than just cost savings
10
Destructive
Retention of
E-Mail
■ Destructive
Retention program
– Approach to e-
mail archiving
where e-mail
messages are
retained for a
limited time
– 90 Day retention
period
11
Newer Technology to Assist
■ Predictive Coding
– Blend of several technologies that work in concert software
that
performs machine language
– “court-endorsed process”
■ Technology- Assisted Review
– TAR computer-assisted review, is not predictive coding (non
linear
review process
– Mechanisms
■ Rules driven
■ Facet driven
■ Propagation based
12
Kahn’s 8
Essential
Steps to
Defensive
Disposition
13
Verify and
document
On an ongoing basis, verify and document the efficacy and
results of the disposition program and modify and/or
augment the process as necessary
Apply
Apply disposition methodology to content as necessary,
understanding that some content can be disposed with
sufficient diligence without classification.
Test
Test, validate, and refi ne as necessary the efficacy of
content assessment and disposition capability methods
with actual data until desired results have been attained.
Assess
Assess content for eligibility for disposition, based on
business need, record retention requirements, and/or legal
preservation obligations.
Develop
Develop a mechanism to modify, alter, or terminate
components of the disposition process when required for
business or legal reasons.
Develop and
document
Develop and document the essential aspects of the
disposition program to ensure quality, efficacy,
repeatability, auditability, and integrity.
Select
Select a practical information assessment and/or
classification approach, given information volumes,
available resources, and risk profile.
Define
Define a reasonable diligence process to assess the
business needs and legal requirements for continued
information retention and/or preservation, based on the
information at issue.
Retention Policies & Schedules
■ Organizations can legally destroy records—but will have a
greater legal
defensibility if:
– The authority to destroy the records is identified on a
retention
schedule.
– The retention requirements have been met.
– The records are slated for destruction in the normal course of
business.
– There are no existing legal or financial holds.
– All records of the same type are treated consistently and
systematically.
■ A key consideration in developing retention schedules is
researching and
determining the minimum time required to keep records that
may be
demanded in legal actions.
■ “A limitation period is the length of time after which a legal
action cannot
be brought before the courts
14
Retention Policies & Schedules
■ Records Retention Schedule
– delineates how long a (business) record series is to be
retained, and
its disposition after its life cycle is complete (e.g., destruction,
transfer, archiving); the schedule also contains “lists of records
by
name or type that authorize the disposition of records
■ Functional Retention Schedule
– groups record series based on business functions, such as
financial,
legal, product management, or sales.
■ Master Retention Schedule
– Retention and disposition requirements for records series that
cross
business unit boundaries.
15
Benefits of a Retention Schedule
■ Reduces legal risk and legal liability exposure.
■ Supports a legally defensible records management program.
■ Improves IG by enforcing uniformity and standardization.
■ Improves search quality and reduces search time.
■ Provides higher-quality records information to improve
decision support for knowledge workers.
■ Prevents inadvertent, malicious, or premature destruction of
records.
■ Improves accountability for life cycle management of records
on an enterprise-wide basis.
■ Improves security for confidential records assets.
■ Reduces and minimizes costs for maintaining records.
■ Determines which records have historic value.
■ Saves hardware, utility, and labor costs by deleting records
after their life span.
■ Optimizes use of online storage and access resource
16
Chapter Summary
■ IG serves as the underpinning for efficient e-discovery
processes.
■ ESI is any information that is created or stored in electronic
format.
■ The goal of the FRCP amendments is to recognize the
importance of
ESI and to respond to the increasingly prohibitive costs of
document
review and protection of privileged documents.
■ Implementing IG, inventorying ESI, and leveraging
technology to
implement records retention and LHN policies are key steps in
e-
discovery planning.
■ LHN management is the absolute minimum an organization
should
implement to meet the guidelines, rules, and precedents.
■ Predictive coding software leverages human analysis when
experts
review a subset of documents to “teach” the software what to
look
for, so it can apply this logic to the full set of documents.
17
Chapter Summary
■ TAR, also known as computer-assisted review, speeds the
review
process by leveraging IT tools.
■ In TAR, there are three main ways to use technology to make
legal review
faster, less costly, and generally smarter: rules driven, facet
driven, and
propagation based.
■ It is important to have the right people in place to support the
technology
and the work flow required to conduct TAR.
■ A defensible disposition framework is an ecosystem of
technology,
policies, procedures, and management controls designed to
ensure that
records are created, managed, and disposed of at the end of their
life
cycle.
■ Retention schedules are basic tools that allow an organization
to prove
that it has a legally defensible basis on which to dispose of
records.
■ The master retention schedule contains all records series in
the entire
enterprise.
■ “Records retention” defines the length of time that records are
to be
kept and considers legal, regulatory, operational, and historical
requirements.
18
Information Governance
Chapter 8
Complete Week 7 Objectives

More Related Content

Similar to CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx

Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business CasePerficient, Inc.
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
E Discovery V2.Pdf
E Discovery V2.PdfE Discovery V2.Pdf
E Discovery V2.PdfFred Travis
 
Records management program
Records management programRecords management program
Records management programDhani Ahmad
 
records management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxrecords management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxErmiyas33
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate BrochureAlan Brooks
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesMarielenaCruzat
 
Module 4.1 - Operation management
Module 4.1 - Operation managementModule 4.1 - Operation management
Module 4.1 - Operation managementszpinter
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - Vpkaviya
 

Similar to CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx (20)

Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
IG-101
IG-101IG-101
IG-101
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
E Discovery V2.Pdf
E Discovery V2.PdfE Discovery V2.Pdf
E Discovery V2.Pdf
 
Records management program
Records management programRecords management program
Records management program
 
records management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxrecords management workshop updated 20141112.pptx
records management workshop updated 20141112.pptx
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Osterman report
Osterman reportOsterman report
Osterman report
 
File000168
File000168File000168
File000168
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
The Impact Of e- Discovery On The CIO
The Impact Of e- Discovery On The CIOThe Impact Of e- Discovery On The CIO
The Impact Of e- Discovery On The CIO
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion Services
 
Data Archiving white paper
Data Archiving white paperData Archiving white paper
Data Archiving white paper
 
Module 4.1 - Operation management
Module 4.1 - Operation managementModule 4.1 - Operation management
Module 4.1 - Operation management
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
 

More from mccormicknadine86

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxmccormicknadine86
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxmccormicknadine86
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxmccormicknadine86
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxmccormicknadine86
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxmccormicknadine86
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxmccormicknadine86
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxmccormicknadine86
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxmccormicknadine86
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxmccormicknadine86
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxmccormicknadine86
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxmccormicknadine86
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxmccormicknadine86
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxmccormicknadine86
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxmccormicknadine86
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxmccormicknadine86
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxmccormicknadine86
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxmccormicknadine86
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxmccormicknadine86
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxmccormicknadine86
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxmccormicknadine86
 

More from mccormicknadine86 (20)

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx

  • 1. CHAPTER 8 INFORMATION GOVERNANCE Information Governance & Legal Functions ITS 833 Dr. Mia Simmons Chapter Overview ■ This chapter will cover pages 115-145 in your book. ■ This chapter covers how Legal functions play a major role into IG. 2 2006 FRCP Procedure ■ Federal Rules of Civil Procedure (FRCP) – Governed the discovery of evidence in lawsuits and other civil cases.
  • 2. – Apply to US district courts – Amended in 2006 – organizations must proactively manage the e-discovery process to avoid sanctions – Electronically stored Information (ESI) – digital stored format for data. 3 Revised FRCP Rules 4 FRCP 1—Scope and Purpose. This rule is simple and clear; its aim is to “secure the just, speedy, and inexpensive determination of every action. FRCP 16—Pretrial Conferences; Scheduling; Management . This rule provides guidelines for preparing for and managing the e-discovery process; the court expects IT and network literacy on both sides, so that pretrial conferences regarding discoverable evidence are productive FRCP 33—Interrogatories to Parties . This rule provides a definition of business es records that are discoverable and the right of opposing parties
  • 3. to request and access them E-Discovery Reference Model 5 Create and retain ESI according to an enforceable electronic records retention policy and electronic records management (ERM) program. Enforce the policy, and monitor compliance with it and the ERM program. Identify the relevant ESI, preserve any so it cannot be altered or destroyed, and collect all ESI for further review. Process and filter the ESI to remove the excess and duplicates. You reduce costs by reducing the volume of ESI that moves to the next stage in the e- discovery process. Review and analyze the
  • 4. filtered ESI for privilege because privileged ESI is not discoverable, unless some exception kicks in. Produce the remaining ESI, after filtering out what’s irrelevant, duplicated, or privileged. Producing ESI in native format is common. Clawback the ESI that you disclosed to the opposing party that you should have filtered out, but did not. Clawback is not unusual, but you have to work at getting clawback approved, and the court may deny it. Present at trial if your case hasn’t settled. Judges have little to no patience with lawyers who appear before them not understanding e-discovery and the ESI of their clients or the opposing side.
  • 5. 6 E-Discovery Reference Model E-Discovery Reference Model ■ Model is a planning tool that presents key e-discovery process steps. ■ Guidelines – Implement an IG program – Inventory your ESI – Create & implement a comprehensive records retention policy, and also include an e-mail retention policy and retention schedules for major ESI areas. – As an extension of your retention policy, implement a legal bold policy that is enforceable, auditable, and legally defensive. – Leverage technology – Develop and execute your e-discovery plant.
  • 6. 7 Intersection of IG and E-Discovery ■ Barry Murphy stated: – Effective IG programs can alleviate e-discovery headaches by reducing the amount of information to process and review, allowing legal teams to get to the facts of a case quickly and efficiently, and can even result in better case outcomes. ■ Legal Hold Process – formal system of polices, processes, and controls is put in place to notify key employees of a civil lawsuit (or impending one) and the set of documents that must put on legal hold. 8 INTERSECTION OF IG AND E- DISCOVERY 9
  • 7. Intersection of IG and E-Discovery ■ Kick-Start Legal Hold – 3 basic steps 1. Define requirements. 2. Define the ideal process. 3. Select the technology. ■ IG & E-Discovery Readiness – Establish a culture that both values information and recognizes the risks inherent in it. – Create a truly cross-functional IG team – Use e-discovery as an IG proof of concept – Measure ROI on more than just cost savings 10 Destructive Retention of E-Mail ■ Destructive
  • 8. Retention program – Approach to e- mail archiving where e-mail messages are retained for a limited time – 90 Day retention period 11 Newer Technology to Assist ■ Predictive Coding – Blend of several technologies that work in concert software that performs machine language – “court-endorsed process” ■ Technology- Assisted Review – TAR computer-assisted review, is not predictive coding (non linear review process
  • 9. – Mechanisms ■ Rules driven ■ Facet driven ■ Propagation based 12 Kahn’s 8 Essential Steps to Defensive Disposition 13 Verify and document On an ongoing basis, verify and document the efficacy and results of the disposition program and modify and/or augment the process as necessary Apply Apply disposition methodology to content as necessary, understanding that some content can be disposed with sufficient diligence without classification. Test Test, validate, and refi ne as necessary the efficacy of
  • 10. content assessment and disposition capability methods with actual data until desired results have been attained. Assess Assess content for eligibility for disposition, based on business need, record retention requirements, and/or legal preservation obligations. Develop Develop a mechanism to modify, alter, or terminate components of the disposition process when required for business or legal reasons. Develop and document Develop and document the essential aspects of the disposition program to ensure quality, efficacy, repeatability, auditability, and integrity. Select Select a practical information assessment and/or classification approach, given information volumes, available resources, and risk profile. Define Define a reasonable diligence process to assess the business needs and legal requirements for continued information retention and/or preservation, based on the information at issue. Retention Policies & Schedules ■ Organizations can legally destroy records—but will have a
  • 11. greater legal defensibility if: – The authority to destroy the records is identified on a retention schedule. – The retention requirements have been met. – The records are slated for destruction in the normal course of business. – There are no existing legal or financial holds. – All records of the same type are treated consistently and systematically. ■ A key consideration in developing retention schedules is researching and determining the minimum time required to keep records that may be demanded in legal actions. ■ “A limitation period is the length of time after which a legal action cannot be brought before the courts 14
  • 12. Retention Policies & Schedules ■ Records Retention Schedule – delineates how long a (business) record series is to be retained, and its disposition after its life cycle is complete (e.g., destruction, transfer, archiving); the schedule also contains “lists of records by name or type that authorize the disposition of records ■ Functional Retention Schedule – groups record series based on business functions, such as financial, legal, product management, or sales. ■ Master Retention Schedule – Retention and disposition requirements for records series that cross business unit boundaries. 15 Benefits of a Retention Schedule ■ Reduces legal risk and legal liability exposure.
  • 13. ■ Supports a legally defensible records management program. ■ Improves IG by enforcing uniformity and standardization. ■ Improves search quality and reduces search time. ■ Provides higher-quality records information to improve decision support for knowledge workers. ■ Prevents inadvertent, malicious, or premature destruction of records. ■ Improves accountability for life cycle management of records on an enterprise-wide basis. ■ Improves security for confidential records assets. ■ Reduces and minimizes costs for maintaining records. ■ Determines which records have historic value. ■ Saves hardware, utility, and labor costs by deleting records after their life span. ■ Optimizes use of online storage and access resource 16 Chapter Summary ■ IG serves as the underpinning for efficient e-discovery processes. ■ ESI is any information that is created or stored in electronic
  • 14. format. ■ The goal of the FRCP amendments is to recognize the importance of ESI and to respond to the increasingly prohibitive costs of document review and protection of privileged documents. ■ Implementing IG, inventorying ESI, and leveraging technology to implement records retention and LHN policies are key steps in e- discovery planning. ■ LHN management is the absolute minimum an organization should implement to meet the guidelines, rules, and precedents. ■ Predictive coding software leverages human analysis when experts review a subset of documents to “teach” the software what to look for, so it can apply this logic to the full set of documents. 17 Chapter Summary
  • 15. ■ TAR, also known as computer-assisted review, speeds the review process by leveraging IT tools. ■ In TAR, there are three main ways to use technology to make legal review faster, less costly, and generally smarter: rules driven, facet driven, and propagation based. ■ It is important to have the right people in place to support the technology and the work flow required to conduct TAR. ■ A defensible disposition framework is an ecosystem of technology, policies, procedures, and management controls designed to ensure that records are created, managed, and disposed of at the end of their life cycle. ■ Retention schedules are basic tools that allow an organization to prove that it has a legally defensible basis on which to dispose of records. ■ The master retention schedule contains all records series in the entire enterprise. ■ “Records retention” defines the length of time that records are to be kept and considers legal, regulatory, operational, and historical requirements.