In the 90s, Legal and IT professionals began compiling computer data and legislation, eDiscovery had its first steps. Back then, nobody would believe that email, let alone social media, could be used in court. 20 years later, eDiscovery is here to stay, but is the industry prepared?
In this session, we will talk about the biggest challenges for eDiscovery and some solutions in the works, with focus on Office 365 technologies.
2. ES2 SECURITY
ENTERPRISE SHAREPOINT
Our Enterprise SharePoint Team focuses on platform governance
and change management in order to mitigate business image to our
client environments.
TRAINING SERVICES
ES2 believe training is essential to maximising business and employee success.
ES2 design, develop and deliver learning solutions from customised training to
certified programs to meet our client needs.
MANAGED SERVICES
ES2 Managed Services know that in today’s business landscape, performance,
stability and reliability of key business systems are critical to ensuring your
business is efficient, competitive and profitable.
ES2 delivers break-fix services in line with Microsoft best practice, to optimise
productivity and cost management.
3. • Introduction
• Impact of eDiscovery
• Challenges and Concerns
• eDiscovery Demo
• eDiscovery Roadmap
• Q & A
http://www.phdcomics.com/comics.php?f=1553
5. U.S. corporations currently
engaged in litigation
Average number of active
lawsuits for $1B+ companies
Average per case cost of
eDiscovery$1Million
147
90%
7. Preservation of potentially relevant data
Prevent deletion of responsive data.
Minimize disruption to the business.
Find relevant data to produce to opposing parties
Dire consequences associated with failing to produce data within aggressive deadlines.
Multi-phased approach that typically involves iterative stages of filtering across different tools.
Identify
and
Preserve
Process
and Search
Review Produce
In-Source Out-Source
8. 68 cases with active eDiscovery efforts per year
45 people under legal hold
1.3TB
13 people’s data searched
288.8GB
Reviewed
16.8GB
Produced
4GB
Used
249 pp.
If Microsoft were to
outsource the unfiltered
entirety of the data to be
processed and searched by
a vendor, the rough
standard charge would be
~$200/GB,
totaling $57,760 per case
or $3.9 million/year.
If Microsoft outsource only the
culled data, data processing
charges are reduced to
$3,360 per case
saving $3.7 million/year
(average)
9. • Completely Outsourced
• Inside Corp Firewall
• Managed by MSIT
• Entirely MS technology
Exchange Servers
Local Data
SharePoint
Linear Review Tool
Review Attorneys
Production
Tool
Production Set
File Shares
.pst content Non-.pst content
10. User A Mailbox
Recoverable Items
Deletions
Deleted Items
Inbox
Versions
Purges
DiscoveryHolds
Server side archiving
All modalities captured
(PC, mobile, web, OWA)
User A on hold
Hold state synced
Skype/Lync archives content into Exchange mailboxes when user is on In-Place Hold
Includes instant messaging and meeting content
11. • Lists, feeds, documents, and pages are covered
• Admins cannot delete the hold data or site
• Version history is preserved if versioning is on
12. User A Mailbox
Recoverable Items
Deletions
Inbox
Purges
Versions
Audits
Deleted Items
…
DiscoveryHold
Calendar Logging
(6) Messages purged by
query based hold
(5) Message
Edited
(3) Message
deleted
(4a) Message “purged”
by user (Litigation Hold /
Single Item Recovery)
Exchange
Lifecycle
(4b) Message “purged”
by user (In-Place Hold)
(1) Message
delivered
(2) Message
moved to
Deleted Items
15. • 2001, Wired did a report on the “all your base are belong to us” phenomenon, covering it from
the Flash animation to its spread through e-mail and Internet forums to T-shirts bearing the
phrase.
• 2003, a group of teenagers placed signs all over town that read: "All your base are belong to
us. You have no chance to survive make your time." They claimed to be playing an April Fool's
joke but most people who saw the signs were unfamiliar with the phrase. USA was at war with
Iraq and police linked them to “terrorist ideas”
• 2004, North Carolina State University students hacked a web-based service provided for local
schools and businesses to report a weather-related closing to display the phrase within a news
ticker on a live news broadcast on TV