Defensible rim disposal leads to effective discovery responses - 2011.08.09Alfresco Software
“Defensible RIM Disposal Leads To Effective Discovery Responses” presented by Rational Retention (RR) and Randy Kahn, an internationally recognized authority on the legal, compliance and policy issues of business information, electronic records and information technology. Join us for this information packed webinar on how to expand your current use of Alfresco by leveraging newest technology in text content classification to solve your retention, records management and e-discovery challenges. Currently the IDC predicts electronic data to grow at 48 times in the next decade of which 95% is currently unstructured data. Learn effective ways to preserve the documents you need to keep, delete the documents you don’t need and move the loose documents into the proper places – all without disrupting the way your end users work.
This white paper discusses the important practices and technologies that any organization should implement in order to improve eDiscovery and drive its cost as low as possible. The paper also presents the results of a primary market research survey conducted specifically for it that highlights the key problems that organizations have with current eDiscovery practices.
Walking the walk - the practical experience of Web2 in researchCameron Neylon
Talk given at the e-science meeting on Web2 in research. Focuses on a couple of case studies trying to draw out what makes an effective and successful Web2 service for researchers.
, eDiscovery: Why Humans Are Better Than Algorithms; ACC Docket May 2010Susan Burns
Article I co-authored on effective use of document review team to control sky-rocketing costs of discovery in litigation. Published in May 2010 issue of ACC "Docket."
Defensible rim disposal leads to effective discovery responses - 2011.08.09Alfresco Software
“Defensible RIM Disposal Leads To Effective Discovery Responses” presented by Rational Retention (RR) and Randy Kahn, an internationally recognized authority on the legal, compliance and policy issues of business information, electronic records and information technology. Join us for this information packed webinar on how to expand your current use of Alfresco by leveraging newest technology in text content classification to solve your retention, records management and e-discovery challenges. Currently the IDC predicts electronic data to grow at 48 times in the next decade of which 95% is currently unstructured data. Learn effective ways to preserve the documents you need to keep, delete the documents you don’t need and move the loose documents into the proper places – all without disrupting the way your end users work.
This white paper discusses the important practices and technologies that any organization should implement in order to improve eDiscovery and drive its cost as low as possible. The paper also presents the results of a primary market research survey conducted specifically for it that highlights the key problems that organizations have with current eDiscovery practices.
Walking the walk - the practical experience of Web2 in researchCameron Neylon
Talk given at the e-science meeting on Web2 in research. Focuses on a couple of case studies trying to draw out what makes an effective and successful Web2 service for researchers.
, eDiscovery: Why Humans Are Better Than Algorithms; ACC Docket May 2010Susan Burns
Article I co-authored on effective use of document review team to control sky-rocketing costs of discovery in litigation. Published in May 2010 issue of ACC "Docket."
Idaho Steelheads digital marketing overview - UltraClean Smokeout - Chad Conn...chadconnally
Presentation slides for the UltraClean SmokeOut Luncheon 11/16/2010. Overview of digital marketing for the Idaho Steelheads with touchpoints for small business owners.
Digital Influence Workshop Series - How Businesses & Non-profits in Cambodia ...digitalinfluencelab
A workshop by Digital Influence Lab (Cambodia) on How Businesses & Non-profits in Cambodia can benefits from Digital Marketing.
This public workshop was conducted 11 Dec 2014, 10am-12nn at USAID Development Innovations, Phnom Penh, Cambodia.
Overview on Digital Marketing and the Social UniverseMamba Media
What is Digital Marketing and where do you start? Planning your website and Marketing Strategy. Why use social media and an overview on the main Social Media channels
Secrets to Success in Digital MarketingKristi DePaul
If going digital sounds daunting to you, it should. In today’s ever-revolving landscape of digital marketing, it’s critical that managers use a sound strategy to guide decisions. A one-size-fits-all approach won’t work in social and electronic media, where success is centered on selecting the most appropriate channels that resonate with customers and accurately represent your brand.
How can marketers navigate through this maze – and cut through the buzz and the noise – to find what really works for their organizations?
We’ll explore the benefits of digital marketing and will dive deep into how you can identify relevant goals, define and re-examine existing digital marketing efforts, learn from best practices in industry, and evaluate meaningful results to ensure the most effective outcomes for your organization.
Digital Marketing refers to advertising delievered through different channels such as search engines, social media, email and many more. Here Adaptra gives you an overview about Digital Marketing and its process in the presentation which will help you to manage and plan you digital marketing insights.
Trigger Agency Profile - Advertising and Digital Marketing ServicesTrigger Advertising
Trigger advertising agency profile presentation. Trigger is a creative advertising and digital marketing agency based out of New Delhi, India. From posters on the wall to talking on the only place where it’s fit to talk to a wall (Facebook, in case you were wondering), we cover the entire gamut from ATL, BTL to online services.
As brands’ story-tellers, we understand how digital nowadays flows seamlessly in 24 hours of a consumer. That radical change has provided us big opportunity to ignite the conversation at the "moment of truth” and sustain the brand experiences beyond transactions of sellers and buyers, to create a relationship of value between brands and consumers.
Since 2013, with a new vision in digital communication marketing, we have geared up to accelerate their creativity in strategy, to provide a desired balance between “WOW” factor and insightful strategy with scalable execution.
Emerald in 2014 proudly introduces more new digital media which empower them in the role of trans-media story-teller.
“It’s not only digital, that is innovations to make experience happen without interruption."
Hampton Roads AMA - 2017 Trends in Digital MarketingGrant Simmons
A quick review of likely digital marketing trends, including; The Multi-screen Consumer, Mobile First, User-Centric Experiences, Augmented Reality & Voice Search | Grant Simmons - Homes.com
eXo Digital Agency is a Digital Media Agency based in Jakarta. Serving local and international brands such as: L.A. Lights Streetball, Prasetiya Mulya Business School, Sentralive, Anker Beer, Electronic Arts, SCEE, Outspark and others with improving their BRAND image online.
Our latest design brochure creds. Check out some of our client work here.
TEN Creative are an award winning design agency in Norwich, Norfolk UK. We work on design for print and digital media, ranging from websites and managed email campaigns to complete brand development via integrated marketing.
Google makes more than 500 algorithm updates a year. LinkedIn now offers more ways to connect with sales prospects than ever before. Keeping track of the changes in digital marketing can make your head spin.
Review this presentation to learn what works today and what you should be thinking about as we head into 2017.
Sheila Kloefkorn, of KEO Marketing Inc, named a top 25 Interactive, Social Media, SEO and Advertising Agency by the Phoenix Business Journal, will walk you through the most important trends you should be thinking about heading into 2017.
Mix Digital is a full service digital marketing agency expertising in digital marketing strategy, social media marketing, web design & development, search marketing. We helps brand interacting sustainably with target audiences via digital platforms
In the ever changing world, marketing strategies are changing fast. A new domain of marketing, digital marketing emerged with the rise of the internet and social media. New trends in digital marketing in the upcoming year can modify the face of marketing.
A presentation about digital marketing overview. Points covered are Search engine optimization (SEO), Pay per click (PPC), Social Media optimization (SMO), digital marketing funnel
With hundreds of terabytes of e-mail, file shares, and other applications, corporations face the potential loss of critical intellectual property, trade secrets, and confidential information when outsourcing identification, collection, culling, early-case assessment, and first-pass review. Outsourcing is no longer an option from both a cost and risk perspective.
Idaho Steelheads digital marketing overview - UltraClean Smokeout - Chad Conn...chadconnally
Presentation slides for the UltraClean SmokeOut Luncheon 11/16/2010. Overview of digital marketing for the Idaho Steelheads with touchpoints for small business owners.
Digital Influence Workshop Series - How Businesses & Non-profits in Cambodia ...digitalinfluencelab
A workshop by Digital Influence Lab (Cambodia) on How Businesses & Non-profits in Cambodia can benefits from Digital Marketing.
This public workshop was conducted 11 Dec 2014, 10am-12nn at USAID Development Innovations, Phnom Penh, Cambodia.
Overview on Digital Marketing and the Social UniverseMamba Media
What is Digital Marketing and where do you start? Planning your website and Marketing Strategy. Why use social media and an overview on the main Social Media channels
Secrets to Success in Digital MarketingKristi DePaul
If going digital sounds daunting to you, it should. In today’s ever-revolving landscape of digital marketing, it’s critical that managers use a sound strategy to guide decisions. A one-size-fits-all approach won’t work in social and electronic media, where success is centered on selecting the most appropriate channels that resonate with customers and accurately represent your brand.
How can marketers navigate through this maze – and cut through the buzz and the noise – to find what really works for their organizations?
We’ll explore the benefits of digital marketing and will dive deep into how you can identify relevant goals, define and re-examine existing digital marketing efforts, learn from best practices in industry, and evaluate meaningful results to ensure the most effective outcomes for your organization.
Digital Marketing refers to advertising delievered through different channels such as search engines, social media, email and many more. Here Adaptra gives you an overview about Digital Marketing and its process in the presentation which will help you to manage and plan you digital marketing insights.
Trigger Agency Profile - Advertising and Digital Marketing ServicesTrigger Advertising
Trigger advertising agency profile presentation. Trigger is a creative advertising and digital marketing agency based out of New Delhi, India. From posters on the wall to talking on the only place where it’s fit to talk to a wall (Facebook, in case you were wondering), we cover the entire gamut from ATL, BTL to online services.
As brands’ story-tellers, we understand how digital nowadays flows seamlessly in 24 hours of a consumer. That radical change has provided us big opportunity to ignite the conversation at the "moment of truth” and sustain the brand experiences beyond transactions of sellers and buyers, to create a relationship of value between brands and consumers.
Since 2013, with a new vision in digital communication marketing, we have geared up to accelerate their creativity in strategy, to provide a desired balance between “WOW” factor and insightful strategy with scalable execution.
Emerald in 2014 proudly introduces more new digital media which empower them in the role of trans-media story-teller.
“It’s not only digital, that is innovations to make experience happen without interruption."
Hampton Roads AMA - 2017 Trends in Digital MarketingGrant Simmons
A quick review of likely digital marketing trends, including; The Multi-screen Consumer, Mobile First, User-Centric Experiences, Augmented Reality & Voice Search | Grant Simmons - Homes.com
eXo Digital Agency is a Digital Media Agency based in Jakarta. Serving local and international brands such as: L.A. Lights Streetball, Prasetiya Mulya Business School, Sentralive, Anker Beer, Electronic Arts, SCEE, Outspark and others with improving their BRAND image online.
Our latest design brochure creds. Check out some of our client work here.
TEN Creative are an award winning design agency in Norwich, Norfolk UK. We work on design for print and digital media, ranging from websites and managed email campaigns to complete brand development via integrated marketing.
Google makes more than 500 algorithm updates a year. LinkedIn now offers more ways to connect with sales prospects than ever before. Keeping track of the changes in digital marketing can make your head spin.
Review this presentation to learn what works today and what you should be thinking about as we head into 2017.
Sheila Kloefkorn, of KEO Marketing Inc, named a top 25 Interactive, Social Media, SEO and Advertising Agency by the Phoenix Business Journal, will walk you through the most important trends you should be thinking about heading into 2017.
Mix Digital is a full service digital marketing agency expertising in digital marketing strategy, social media marketing, web design & development, search marketing. We helps brand interacting sustainably with target audiences via digital platforms
In the ever changing world, marketing strategies are changing fast. A new domain of marketing, digital marketing emerged with the rise of the internet and social media. New trends in digital marketing in the upcoming year can modify the face of marketing.
A presentation about digital marketing overview. Points covered are Search engine optimization (SEO), Pay per click (PPC), Social Media optimization (SMO), digital marketing funnel
With hundreds of terabytes of e-mail, file shares, and other applications, corporations face the potential loss of critical intellectual property, trade secrets, and confidential information when outsourcing identification, collection, culling, early-case assessment, and first-pass review. Outsourcing is no longer an option from both a cost and risk perspective.
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
The REAL Impact of Big Data on PrivacyClaudiu Popa
The awesome promise of Big Data is tempered by the need to protect personal information. Data scientists must expertly navigate the legislative waters and acquire the skills to protect privacy and security. This talk provides enterprise leaders with answers and suggests questions to ask when the time comes to consider the vast opportunities offered by big data.
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
Early Case Assessment provides the framework for litigators to identify and analyze electronically stored information in response to a litigation hold and.or discovery request.
Big Data - it's the big buzz. But is it dead on arrival?
In this presentation Daragh O Brien looks at the history of information management, the challenges of data quality and governance, and the implications for big data...
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
Data leakage prevention is one of the key topics which we have been talking in present. Due to the organizations moving towards big data, financial systems.. which resides in cyber space, there is an increasing number of frauds associated with the technology revolution in the cyberspace.This post highlights the threats and the counter measures, so we can protect the sensitive personal data. I prefer the approach of “ Trust but verify model ”.
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
Do you have too much old information, but not enough guidance to begin the task of cleaning out your data stores? Join Perficient to learn 10 tips for creating a strategic roadmap to take control of your information and uncover the technology that can support your efforts, including how to:
Stop keeping everything forever
Create an information governance and disposal policy before implementing technology
Automate information management to improve employee productivity
Prepare a discovery response plan
Predict Conference: Data Analytics for Digital Forensics and CybersecurityMark Scanlon
Information overload is one of the biggest problems facing professionals working in the fields of Digital Forensics and Cybersecurity. The sheer volume of cases requiring digital forensic analysis in law enforcement agencies throughout the world is outstripping the capacities of digital forensic laboratories. This has resulted in huge digital evidence backlogs becoming commonplace and cases being ruled upon in court without the inclusion of potentially pertinent information, which is sitting idle in some evidence store. As is commonly relayed in the media, the frequency of cyberattacks being faced by governments, law enforcement agencies, and industry is increasing, alongside the sophistication of the techniques used. Current rules-based network intrusion detection systems are predominantly based on historic, known threat vectors and result in a very high amount of false positive alerts being generated. Intelligent, real-time, automated data processing and event categorisation is one solution that shows great promise to combat this information overload.
Similar to Proactive Archiving Strategy For Aiim Minn (20)
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. “Receiving a discovery request is like being
pulled over for a broken headlight and
having f ll b d
h i a full body cavity search done.”
it hd ”
Unknown CEO
Uk
4. Most Frequently Requested Record Types in
Discovery
y
E-mail ( d attachments )
E il (and tt h t 80%
General office productivity documents 60%
Databas e records 49%
Invoices and other customer records 41%
Financial statements 36%
Telephone call recordings and other audio files 29%
Digital images 25%
Ins tant mes sages 21%
Video files 16%
Other 5%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
ESG Research Discovery Survey Nov 2007
4
5. Average Age of Data Requested During
Discovery (
y (General Counsel Survey)
y)
60%
48%
50%
40%
30%
20%
15% 15% 15%
10%
4% 4%
0%
Most data is Most data is Most data is Most data is Most data is Don't know /
less than 6 between 6 and between 12 between 24 more than 36 refused to
months old 12 months old and 24 months and 36 months months old answer
old old
ESG Research Discovery Survey Nov 2007
5
6. ESI eDiscovery Trends:
More Costly, More Complicated
y, p
The legal problem is immense for large, midsize and small
companies:
Among midsize companies, 98% had between 1 and 20 $20-million
lawsuits; the other 2% had between 21 and 50.
58% of companies had between 1 and 50 new lawsuits in 2007.
Almost 40% of the largest companies surveyed spent $5 million or
more annually on litigation.
* Source: 2007 Fulbright & Jaworski Litigation Trends Survey
A growing body of case law and judgments affects IT:
Victor Stanley Inc v Creative Pipe Inc 2008 WL 2221841 (D Md May 29
Stanley, Inc. v. Pipe, Inc., (D.Md. 29,
2008) —risks of keyword search
Hopson v. Mayor of Baltimore, 232 FRD 228 (D. Md. 2005) —parties ordered to
create a reasonable discovery plan
7. eDiscovery is a Problem
The American Bar Association Digital Evidence Project and
National Law Journal Report:
Over 30 Billion emails are sent daily
Over 90% of ALL information is now electronic
Typical Fortune 500 company has 125 on going cases with at least 75%
on-going
requiring electronic discovery
62% of companies surveyed doubt they can show their electronic records
are accurate and reliable
9. The New FRCP Amendments..
Explicitly makes “electronically stored
information” a category of discoverable d t
if ti ” t f di bl data
Mandates early meet-and-confer sessions
Provides “safe harbor” in the event of “good
faith” destruction of discoverable data
Litigation Hold expectations
10. So, What is Discoverable and Subject to
Litigation Holds?
g
Email
Calendars
Attachments
Files Contacts
Task Lists
Anything else? Specific Points in Time
Conversation Threads
File Attributes
Metadata
Backup Tapes
11. Major Risks Associated with ESI in
Litigation
g
Stopping system managed deletions
Stopping deletion of potentially responsive
Electronically Stored Information (ESI) by
employees
l
Applying a Litigation Hold
Inability to effectively filter ESI to determine
responsiveness, or privilege
Not turning over all responsive ESI
Turning over too much ESI
12. Major Costs Associated with ESI in Litigation
Searching for responsive ESI in the corporate
infrastructure
if t t
File Servers
On-line
On line Storage Systems
Failover Locations
Email Servers
Instant Messaging Servers
Backup Tapes
Network Share Drives
13. Major Costs Associated with ESI in Litigation
Searching for responsive ESI at the custodian
level
l l
Custodian Workstations PDAs
Custodian Laptops Cell Phones
CD/DVDs iPods
USB Thumb Drives Digital Cameras
External Hard disks Personal Email Accounts
Home PCs
14. Challenges for eDiscovery
Managing Legal Risk
Litigation Hold - Spoliation
Turning over too much data – Privilege
Turning over too little data – Adverse Inference
Managing Legal Cost
Stopping deletions is costly to ensure
Slow eDiscovery response results in severe penalties and fines
Disruptive data capture decreases employee productivity
Restoration of backup tapes for searching is extremely costly
15. New eDiscovery Case Law
Best Buy Stores, L.P. v. Developers Diversified Realty Corp., 2007 WL
333987 (D Minn Feb 1 2007)
(D. Minn. Feb. 1,
Backup tapes are not inaccessible: “Defendants offer no proof, aside from
conclusory statements, about the cost to obtain documents from electronic
archives. So this concern cannot shield the defendants from discovery here.”
Columbia Pictures Industries v. Bunnell, CV 06-1093 FMC (JCx), U.S.
District Court for the Central District of California (May 2007)
(y )
Server transaction logs are discoverable: An issue addressed by the judge was
whether requiring the defendants to preserve and produce the server log data was
tantamount to forcing them to create new data, since the defendants' systems had
not created these types of logs before.
t t d th t fl bf
16. New eDiscovery Case Law
Goodbys Creek, LLC v. Arch Ins.., 2008 WL 4279693 (M.D. Fla.
Sept. 15, 2008)
…in a reasonably usable form does not mean that a responding party is free to
convert electronically stored information from the form in which it is ordinarily
maintained to a different form that makes it more difficult or burdensome for
the requesting party to use the information efficiently in the litigation.
Metrokane, Inc. v. Built NY, Inc., 2008 WL 4185865 (S.D.N.Y. Sept.
3, 2008)
Adverse Inference and Other Sanctions Warranted for Plaintiff's Failure to
Produce Damaging Emails that were Eventually Produced by Third Party
Magistrate Judge Michael H. Dolinger rejected Metrokane’s procedural
defense, and concluded that BNY sufficiently demonstrated discovery
misconduct by Metrokane and resulting prejudice. Accordingly, the court
granted a variety of remedies including an adverse inference instruction
remedies, instruction.
17. New eDiscovery Case Law
White v. Graceland Coll. Ctr. for Prof’l Dev. & Lifelong Learning,
Inc., 2008 WL 3271924 (D. Kan. Aug. 7, 2008)
The Court finds that Defendants failed to produce the emails and attachments
in either the form in which they are ordinarily maintained, or in a quot;reasonably
usable form,quot; as required by Rule 34(b)(2)(E)(ii). Defendants' conversion of
the emails and attachments to PDF documents and production of the PDF
documents in paper format does not comply with the option to produce them in
a reasonable usable form.
Bright v. United Corp., 2008 WL 2971769 (V.I. July 22, 2008)
Supermarket's Failure to Retain Video Surveillance Footage of Periods
Preceding and Following Slip and Fall Incident quot;Shocks the Conscience of the
Shocks
Courtquot; and Warrants Adverse Inference Instruction
18. The Cost of Review
quot;A recent study that appeared in Digital Discovery & e-
Evidence showed that for a smaller case with 30
that,
gigabytes of data, manual review could cost $3.3
million. The study described how a more advanced
electronic approach could reduce that cost by 89%, to
less than $360,000. See 'Document Analytics Allow
Attorneys to be Attorneys,'
y y,
(Chris Paskach and Vince Walden, DDEE, August 2005,
page 10.)quot;
19. Challenges for eDiscovery – Manual Process
Manual Discovery is risky as well as time
consuming and di
i d disruptive - costly
ti tl
Responsive records can be anywhere
Impossible to place a litigation hold quickly and
completely
How can you be sure all targeted employees have
y g py
stopped deletions of potentially responsive content?
Did I find everything?
19
20. Challenges for eDiscovery – Manual Process
Email Boxes
Exchange Dumpster
Backup Tapes
CDs/DVDs
Email Server PDAs
Custodian Workstations
`
eDiscovery Order
File Server
Thumb Drives
MP3s/iPods
Share Drives
Digital Cameras
21. Challenges for eDiscovery – Reactive
Solutions (Crawling)
( g)
Reactive Discovery is risky, time consuming and
disruptive t th i f t t
di ti to the infrastructure
Again, responsive records can be anywhere
Impossible to place a litigation hold quickly and
completely
Reactive crawls and hard disk imaging is disruptive
gg p
to custodian productivity
Did I find everything?
21
22. Challenges for eDiscovery - Archiving
First generation archiving solutions don’t address
the question – What’s discoverable?
What s
Incomplete capture of historical data
If you don’t capture everything then your
don t everything,
litigation hold will be incomplete
Cumbersome and complicated eDiscovery
Doesn t
Doesn’t capture all discoverable data
22
23. Proactive Archiving of all Discoverable
Data
Advantages of proactive archiving for discovery
over manual di
l discovery or reactive crawling
ti li
Ability to perform early case assessment – data is
always at hand
Place litigation holds immediately
Disposition of records is automatically managed
p y g
Data is single-instanced so only one copy exists
Archive provides a data inventory for “meet and
confer” session
Archive provides a “Single Point of Discovery” for
email and file system data
24. Disadvantages
Archive storage requirements
But…
How much of your tier one storage resources is being
consumed with PSTs and duplicates of office files?
What's your real cost of manual or reactive
y
discovery?
25. The Biggest Argument Against Archiving
from Corporate Legal…
p g
“The more data we keep the bigger the chance
it will be used against us in litigation”
Not necessarily the case…
26. Employees Keep Stuff No Matter
Employees will keep data for all kinds of
reasons
Employees will not adhere to retention policies
on d t they squirrel away
data th il
With no centralized management, thousands of
copies can exist for long periods of time
exist…for
All this does is d i up you di
thi d i drive discovery cost
t
27. Blanket Retention Policies –
Unsafe Harbors
“We save everything until our mail
server gets full – then we delete
everything and start anew.”
anew.
“We save everything for 30 (60 or 90)
days and we’ve never h d a problem.”
d d ’ had bl ”
“We gave up trying to figure out
We
individual retention rules and now keep
everything for 10 (15 or 20) years.”
(202) 342-2550
bsavarino@cohenmohr.com
28. Discovery Strategies for Small Entities
Control your organizations data – all of it
Know your infrastructure
Know what data is created and deleted
Be able to lock it down quickly
Judges don’t care what you can afford
Get outside legal advice – legal advice is an
insurance policy If a lawyer told you it was
policy.
alright, then you are better off
Get that advice in writing
g
29. Discovery Strategies for Small Entities
Create policies and procedures
Create a litigation hold process
Create a eDiscovery process
Create a ESI retention policy
Test all of them
Train employees on all policies
Audit employee compliance
And document everything
y g
30. Discovery Strategies for Medium and Large
Entities
Control your organizations data – all of it
This includes video surveillance
Entrance/exit card access
Put a centrally controlled ESI archive in place
If multinational, be aware of international data
retention precautions
p
Get internal or external legal advice
g
31. Discovery Strategies for Medium and Large
Entities
Inventory your data infrastructure
What applications are used that create data
Where is the data stored
How many copies are stored
Do any of the systems have an automatic disposition process
Do you have systems where the employee has the ability to
keep a copy locally
Create a data map and keep it updated
Understand you regulatory retention
requirements
32. Discovery Strategies for Medium and Large
Entities
Create records retention policies. Policy(s)
should b i place and i l
h ld be in l d implemented well i
td ll in
advance of any potential or actual litigation or
investigation 3 month retention
Inbox
2 year retention
Project 1
Project 2 3 year retention
Project 3 1 year retention after deletion
Sent Items 6 month retention
33. Discovery Strategies for Medium and Large
Entities
Legally refresh the policies on a regular basis
Prohibit the creation of employee PSTs
Disable workstation CD/DVD drives and USB
connections
Hold regular update meetings for corporate
legal and IT
l ld
Train all employees on the policies
Document everything
34. Discovery Strategies for Medium and Large
Entities
Prepare your employees for questioning from
the th
th other side…
id
Interrogatories are written and sometime in-person
questions posed by the opposing counsel that are
designed to discover key facts about an opposing
party's case.
For IT, this usually will include questions relating to
the corporate infrastructure.
infrastructure
35. Summary
Proactively archiving ESI including email and
office files reduces di
ffi fil d discovery costs and risks
t dik
Applying policies to archived data insures data
doesn’t stick around forever
Preparing for discovery ahead of time puts you
in better
i a b tt position when liti ti starts
iti h litigation t t
37. NearPoint Key Differentiators
Unified backend for all user generated content types
Centralized control of retention policies and litigation holds
Consolidated view for eDiscovery
Granular policy definitions
Advanced seamless and shortcut style stubbing
technology
gy
Flexible file recovery mechanisms for administrators
Advanced reporting, monitoring and alerting functionality
37
38. Where NearPoint Fits in the eDiscovery
Ecosystem
y
NearPoint eDiscovery Option
(eDO) – search, review, tag and
set legal hold on potentially
g y
responsive content
NearPoint Archive for File
and Email Systems Processing
Preservation
Information
Identification Review Production Presentation
Management
•C t Collection
Capture
• Archive
• Retain Analysis
• Dispose
• Monitor
NearPoint
Custodian
Collector
Option (CCO) –
helps with
reactive
Electronic Discovery Reference Model
collection of
www.edrm.net
historical file
and desktop
content 38
38
39. eDiscovery with Mimosa NearPoint
eDiscovery
Request
Mimosa N P i t A hi
Mi NearPoint Archive
captures all discoverable content
in real near-time
Email Server
Mimosa NearPoint Archive Server
Single P i t f Di
Si l Point of Discovery
File Server
Using the eDiscovery Option, the legal
Option Single Instance
staff can search for, review, tag and Archive Storage
and Index
place litigation holds as well as export
responsive records for external legal
counsel, plaintiff’s attorney or
importation into case management tool.
The IT department is not required in any
steps