SlideShare a Scribd company logo
Digital law and governance
e-discovery
	Jacques	Folon		Ph.D.	
www.folon.com	
Partner	Edge	Consulting	
Maître	de	conférences		
Université	de	Liège		
Professor	
ICHEC	Brussels	Management	School		
Visiting	Professor	
ESC	Rennes	
Université	de	Lorraine	(Metz)	
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
4
3
1.where are we now ?
2.Need of an electronic content
management
3.E-discovery
4.Sedona Principles
1. Where are we now?
5
Information overload
6
Control ?
Which information ?
• Electronically stored information (ESI)
• Scannes documents
• Fax
• Texts, excel sheets, powerpoint (word, pages,
including old versions of the software versions)
• Emails in & out
• Databases, websites, blogs,…
• Hard disks (central, local, pc, external, USB
sticks, …)
• CRM, CMS
• GSM et PDA
• Time sheet
• Acounting
• Intant messaging
• Voice mail
• GPS navigation systems
• Metadata
• social networks (internbal & external)
• … 8
9
Increase of data from 2010 ->2014 = + 650% (Gartner)
85% of the data are not structured
80% of data search gave no result
2. Prerequisite:
Electronic data management
10
www.aiim.org/training
Source : https://www.britestream.com/difference.html.
• Most of today’s
records start out
in electronic form
– Letters
– Emails
– Faxes
– Web transactions
– Other transactions
Copyright © AIIM | All rights reserved
The importance of records
Source: What is ERM www.aiim.org/training
Electronic records management
• The electronic management of paper
records?
• The management of electronic records?
Question: Is ERM
Answer: Both
Source: What is ERM www.aiim.org/training
For each type of content, evaluate the degree of control that exists in your
organization in managing it.
Content types and how well managed
All respondents (462)
Source: What is ERM www.aiim.org/training
ERM
Effectiveness
Continuity
Efficiency
Com
pliance
What are the main business drivers?
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Driver: Compliance
• Laws
• Regulations
• Policies
• Standards
• Good practice
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Driver: Effectiveness
• Not losing records
• Sharing records
• Finding records easily
• Getting the complete picture
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Driver: Efficiency
• Accessing records quickly
• Space savings
• Reduced handling costs
• Other examples
– Archival costs
– Disposal of furniture
– Consumables
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Driver: Continuity
• Records are vulnerable to loss
• Businesses tend to fail if they
lose their records
• Electronic storage may
speed recovery from
a disaster
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
The records lifecycle
Copyright © AIIM | All rights reserved
Source: NARA
Source: What is ERM www.aiim.org/training
Fundamental principles
• Records are created, received,
and used in the conduct of
organisational activities
• Organisations should create
and maintain authentic,
reliable, and usable records
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Access and usage principles
• Records should be accessible to authorised
users
• Users should be able to
search and access records
in usable formats
• Records should be organised
to support access and
management
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Retention principles
• Records must be managed through their
lifecycle
• Records should be kept as long as required
– Statutory requirements
– Legal requirements
– Business or operational needs
• Retaining records longer than required may
increase organisational liability
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Disposition principles
• Disposition is an accepted phase of the
records lifecycle
– Transfer/accession
– Destruction
• Records should be
disposed of at the
end of the lifecycle
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
What is ‘Capture’
ERM System
Capture
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
The purpose of capturing records
▪Establish a relationship between the record
and its context
▪Place the record into a controlled
environment
▪Link the record to other related records
▪Allow the record to be managed effectively
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Why not capture everything?
• Hard cost of storage
• Volume of non-records to sift through
– Operationally
– For legal or audit requirements
• Increased liability for
disclosing too much
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
So, what is metadata?
• Metadata = “Data about data”
– For a document or record this means data such
as its author, its title, the issue date, and other
information which can usefully be associated
with it
• Nothing new or unique
• Defined in terms of units called “Elements”
or “Fields.”
– Some support “sub-elements” or “attributes”
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Perspectives on metadata
• Entering metadata is often called “indexing”
• Different users of an ERM system will have
different views of what metadata can do for
them, and what metadata is required
– Business perspective
– Records management perspective
– User perspective
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Why is access control necessary?
• Ensure ‘systematic control’ and ‘credible
evidence’
• Ensure authoritative records
• Protect commercially sensitive information
• Protect personal
information
• Limit access to protectively
marked information
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
The objects of user access rights
• Provide or limit access to specific
classes,
files or records
• Provide or limit access to features
• Provide or limit access by security
classification
– ‘Need to know’
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Retention periods - 1
• Capturing a record implies need for
retention
• A record may be retained in different ways
– ERM system
– Software application
– Separate electronic media
– Paper
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
Retention periods - 2
• Records will vary in their intrinsic nature
• Some records may need to be retained for
very long periods of time
• Other records will need to be
retained for shorter periods
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
The benefits of destroying records
• Keeping everything forever is expensive
– Storage costs
– Search and retrieval
– Discovery
• Courts have held that there is no
requirement to keep everything forever
• Destroying records reduces risk
– When it is done consistently and in accordance
with the records program
Copyright © AIIM | All rights reserved
Source: What is ERM www.aiim.org/training
3. After ERM => ediscovery
36
Definition & context
• E-dicovery is a process to search, localise,
secure, identify a data in order to have it
as an evidence before the court
• Necessity to have a quick result
• the right data at the right time
• translation sometimes necessary
37Source www.systran.fr
Ediscovery model
38
Source for the next 9 slides: http://edrm.net
1/information mgt
39
2/ identification
40
3/ preservation
41
4/ collection
42
Collection is the acquisition of potentially relevant electronically stored information
(ESI) as defined in the identification phase of the electronic discovery process. The
exigencies of litigation, governmental inquiries, and internal investigations generally
require that ESI and its associated metadata should be collected in a manner that is
legally defensible, proportionate, efficient, auditable, and targeted.
5/ processing
43
6/ review
44
7/ Analyse
45
8/ Production
46
9/ Presentation
47
GSA IT Quarterly Forum --
Aug 2007
48
4/ The Sedona Principles: 

Best Practices Recommendations & Principles for Addressing Electronic Document
Production 

(Second edition, June 2007)
The Sedona Guidelines: 

Best Practices Guidelines & Commentary for Managing Information and Records in the
Electronic Age 

(Sept. 2005)
49
The Sedona Guidelines
– Second work product of working group
– Draft published in September 2004 for public comment; published
in September 2005.
– They are:
• Important background and roadmap of issues
• Link between RIM, IT and Legal Perspectives
• Flexible, Scalable and Reasonable
– They are not:
• Standards or minimum requirements
• Unchangeable
50
The Sedona Guidelines
• 1. An organization should have reasonable policies and
procedures for managing its information and records.
51
The Sedona Guidelines
• 2. An organization’s information and records management
policies and procedures should be realistic, practical and
tailored to the circumstances of the organization.
52
The Sedona Guidelines
• 3. An organization need not retain all electronic
information ever generated or received.
53
The Sedona Guidelines
• 4. An organization adopting an information and records
management policy should consider including procedures
that address the creation, identification, retention, retrieval
and ultimate disposition or destruction of information and
records.
54
The Sedona Guidelines
• 5. An organization’s policies and procedures must mandate
the suspension of ordinary destruction practices and
procedures as necessary to comply with preservation
obligations related to actual or reasonably anticipated
litigation, governmental investigation or audit.
5. Conclusion
55
Information security manager
Are we ready to be there?
59
Jacques Folon
Jacques.folon@ichec.be
Any questions ?

More Related Content

What's hot

The Challenges of Online Trust
The Challenges of Online TrustThe Challenges of Online Trust
The Challenges of Online Trust
Alex Todd
 
Building Trust in the Cloud
Building Trust in the CloudBuilding Trust in the Cloud
Building Trust in the Cloud
Databarracks
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
Performance Tuning Corporation
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
Tomppa Järvinen
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
Skillspire LLC
 
Information security overview
Information security overviewInformation security overview
Information security overview
Ponum Raja
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
Jean-François LOMBARDO
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
Logicalis
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
Dr. Ahmed Al Zaidy
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
Graeme Cross
 

What's hot (20)

The Challenges of Online Trust
The Challenges of Online TrustThe Challenges of Online Trust
The Challenges of Online Trust
 
Building Trust in the Cloud
Building Trust in the CloudBuilding Trust in the Cloud
Building Trust in the Cloud
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
 
Information security overview
Information security overviewInformation security overview
Information security overview
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 

Similar to E-discovery

Ediscovery
Ediscovery Ediscovery
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
Prof. Jacques Folon (Ph.D)
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
Everteam
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
Academy of Science of South Africa (ASSAf)
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
Ina Smith
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
J. David Morris
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
Bill LeFurgy
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
Robust Marketing & Consulting (Pty) Ltd
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
Atle Skjekkeland
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
Paul Hampton
 
Ch12 records management
Ch12 records managementCh12 records management
Ch12 records management
xtin101
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
David Kearney
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeeping
Expoco
 
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLSDATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
tpmasekwa
 
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
Keith Atteck C.Tech. ERMm
 
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
Abolade Lekan
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
Ark Group Australia Pty Ltd
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by Sigma
Jonathan Simpson
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
EliseT2015
 

Similar to E-discovery (20)

Ediscovery
Ediscovery Ediscovery
Ediscovery
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
 
Ch12 records management
Ch12 records managementCh12 records management
Ch12 records management
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeeping
 
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLSDATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
DATA & RECORDS MANAGEMENT COURSE ISO RECORDS MANAGEMENT CONTROLS
 
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
 
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by Sigma
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
 

More from Prof. Jacques Folon (Ph.D)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
Prof. Jacques Folon (Ph.D)
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
Prof. Jacques Folon (Ph.D)
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
Prof. Jacques Folon (Ph.D)
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
Prof. Jacques Folon (Ph.D)
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
Prof. Jacques Folon (Ph.D)
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
Prof. Jacques Folon (Ph.D)
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
Prof. Jacques Folon (Ph.D)
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
Prof. Jacques Folon (Ph.D)
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
Prof. Jacques Folon (Ph.D)
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
Prof. Jacques Folon (Ph.D)
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
Prof. Jacques Folon (Ph.D)
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
Prof. Jacques Folon (Ph.D)
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
Prof. Jacques Folon (Ph.D)
 
E comm et rgpd
E comm et rgpdE comm et rgpd
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
Prof. Jacques Folon (Ph.D)
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Prof. Jacques Folon (Ph.D)
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
Prof. Jacques Folon (Ph.D)
 

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

E-discovery

  • 1. Digital law and governance e-discovery Jacques Folon Ph.D. www.folon.com Partner Edge Consulting Maître de conférences Université de Liège Professor ICHEC Brussels Management School Visiting Professor ESC Rennes Université de Lorraine (Metz) http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
  • 2. 4
  • 3. 3 1.where are we now ? 2.Need of an electronic content management 3.E-discovery 4.Sedona Principles
  • 4. 1. Where are we now? 5
  • 7. Which information ? • Electronically stored information (ESI) • Scannes documents • Fax • Texts, excel sheets, powerpoint (word, pages, including old versions of the software versions) • Emails in & out • Databases, websites, blogs,… • Hard disks (central, local, pc, external, USB sticks, …) • CRM, CMS • GSM et PDA • Time sheet • Acounting • Intant messaging • Voice mail • GPS navigation systems • Metadata • social networks (internbal & external) • … 8
  • 8. 9 Increase of data from 2010 ->2014 = + 650% (Gartner) 85% of the data are not structured 80% of data search gave no result
  • 12. • Most of today’s records start out in electronic form – Letters – Emails – Faxes – Web transactions – Other transactions Copyright © AIIM | All rights reserved The importance of records Source: What is ERM www.aiim.org/training
  • 13. Electronic records management • The electronic management of paper records? • The management of electronic records? Question: Is ERM Answer: Both Source: What is ERM www.aiim.org/training
  • 14. For each type of content, evaluate the degree of control that exists in your organization in managing it. Content types and how well managed All respondents (462) Source: What is ERM www.aiim.org/training
  • 15. ERM Effectiveness Continuity Efficiency Com pliance What are the main business drivers? Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 16. Driver: Compliance • Laws • Regulations • Policies • Standards • Good practice Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 17. Driver: Effectiveness • Not losing records • Sharing records • Finding records easily • Getting the complete picture Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 18. Driver: Efficiency • Accessing records quickly • Space savings • Reduced handling costs • Other examples – Archival costs – Disposal of furniture – Consumables Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 19. Driver: Continuity • Records are vulnerable to loss • Businesses tend to fail if they lose their records • Electronic storage may speed recovery from a disaster Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 20. The records lifecycle Copyright © AIIM | All rights reserved Source: NARA Source: What is ERM www.aiim.org/training
  • 21. Fundamental principles • Records are created, received, and used in the conduct of organisational activities • Organisations should create and maintain authentic, reliable, and usable records Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 22. Access and usage principles • Records should be accessible to authorised users • Users should be able to search and access records in usable formats • Records should be organised to support access and management Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 23. Retention principles • Records must be managed through their lifecycle • Records should be kept as long as required – Statutory requirements – Legal requirements – Business or operational needs • Retaining records longer than required may increase organisational liability Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 24. Disposition principles • Disposition is an accepted phase of the records lifecycle – Transfer/accession – Destruction • Records should be disposed of at the end of the lifecycle Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 25. What is ‘Capture’ ERM System Capture Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 26. The purpose of capturing records ▪Establish a relationship between the record and its context ▪Place the record into a controlled environment ▪Link the record to other related records ▪Allow the record to be managed effectively Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 27. Why not capture everything? • Hard cost of storage • Volume of non-records to sift through – Operationally – For legal or audit requirements • Increased liability for disclosing too much Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 28. So, what is metadata? • Metadata = “Data about data” – For a document or record this means data such as its author, its title, the issue date, and other information which can usefully be associated with it • Nothing new or unique • Defined in terms of units called “Elements” or “Fields.” – Some support “sub-elements” or “attributes” Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 29. Perspectives on metadata • Entering metadata is often called “indexing” • Different users of an ERM system will have different views of what metadata can do for them, and what metadata is required – Business perspective – Records management perspective – User perspective Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 30. Why is access control necessary? • Ensure ‘systematic control’ and ‘credible evidence’ • Ensure authoritative records • Protect commercially sensitive information • Protect personal information • Limit access to protectively marked information Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 31. The objects of user access rights • Provide or limit access to specific classes, files or records • Provide or limit access to features • Provide or limit access by security classification – ‘Need to know’ Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 32. Retention periods - 1 • Capturing a record implies need for retention • A record may be retained in different ways – ERM system – Software application – Separate electronic media – Paper Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 33. Retention periods - 2 • Records will vary in their intrinsic nature • Some records may need to be retained for very long periods of time • Other records will need to be retained for shorter periods Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 34. The benefits of destroying records • Keeping everything forever is expensive – Storage costs – Search and retrieval – Discovery • Courts have held that there is no requirement to keep everything forever • Destroying records reduces risk – When it is done consistently and in accordance with the records program Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 35. 3. After ERM => ediscovery 36
  • 36. Definition & context • E-dicovery is a process to search, localise, secure, identify a data in order to have it as an evidence before the court • Necessity to have a quick result • the right data at the right time • translation sometimes necessary 37Source www.systran.fr
  • 37. Ediscovery model 38 Source for the next 9 slides: http://edrm.net
  • 41. 4/ collection 42 Collection is the acquisition of potentially relevant electronically stored information (ESI) as defined in the identification phase of the electronic discovery process. The exigencies of litigation, governmental inquiries, and internal investigations generally require that ESI and its associated metadata should be collected in a manner that is legally defensible, proportionate, efficient, auditable, and targeted.
  • 47. GSA IT Quarterly Forum -- Aug 2007 48 4/ The Sedona Principles: 
 Best Practices Recommendations & Principles for Addressing Electronic Document Production 
 (Second edition, June 2007) The Sedona Guidelines: 
 Best Practices Guidelines & Commentary for Managing Information and Records in the Electronic Age 
 (Sept. 2005)
  • 48. 49 The Sedona Guidelines – Second work product of working group – Draft published in September 2004 for public comment; published in September 2005. – They are: • Important background and roadmap of issues • Link between RIM, IT and Legal Perspectives • Flexible, Scalable and Reasonable – They are not: • Standards or minimum requirements • Unchangeable
  • 49. 50 The Sedona Guidelines • 1. An organization should have reasonable policies and procedures for managing its information and records.
  • 50. 51 The Sedona Guidelines • 2. An organization’s information and records management policies and procedures should be realistic, practical and tailored to the circumstances of the organization.
  • 51. 52 The Sedona Guidelines • 3. An organization need not retain all electronic information ever generated or received.
  • 52. 53 The Sedona Guidelines • 4. An organization adopting an information and records management policy should consider including procedures that address the creation, identification, retention, retrieval and ultimate disposition or destruction of information and records.
  • 53. 54 The Sedona Guidelines • 5. An organization’s policies and procedures must mandate the suspension of ordinary destruction practices and procedures as necessary to comply with preservation obligations related to actual or reasonably anticipated litigation, governmental investigation or audit.
  • 56.
  • 57. Are we ready to be there? 59