SlideShare a Scribd company logo
©2007RENEWDATACORP.
e D i s c o v e r y p l a n n i n g , p r e s e r v a t i o n ,
c o l l e c t i o n , p r o c e s s i n g , a r c h i v i n g ,
r e v i e w a n d p r o d u c t i o n . . .
w i t h o n e s o l u t i o n p r o v i d e r ,
a t o n e s e c u r e f a c i l i t y .
1
Ta b l e o f C o n t e n t s
Introduction page 1
Electronic Evidence Services page 2
Planning page 6
Preservation and Collection page 8
Processing page 14
Review page 18
Production page 18
Technology page 20
The Company page 30
E l e c t r o n i c
E v i d e n c e S e r v i c e s
3
E l e c t r o n i c E v i d e n c e S e r v i c e s
5
RENEWDATA BENEFITS AND COST SAVINGS COMPARISON
RenewData Electronic Evidence Services VS. Internal IT or other vendors
Electronic collection • Spoliation exposure eliminated with preservation
and preservation of evidence using documented chain-of-custody
procedures
Data extraction and • Fast, high-volume, cost-effective extraction and
processing processing possible with RenewData technology –
up to 84% less cost*
Document production and • Production costs and review time are greatly reduced
outside counsel review as data is de-duplicated and culled for responsive
data before final production – up to 56% less cost*
Subsequent discovery • Faster, cost-effective responses possible as
requests ActiveVault stores already culled and de-duplicated
data
• Reduced time and costs spent on litigation as you have
readily available knowledge of your legal situation
Proliferation of electronic • Proactive development of retention and destruction
data (user files and email) policies possible with ActiveVault storage
throughout organization
• Strategic assessment of legal liabilities possible
with ActiveVault storage
* Cost savings based on a hypothetical project. Your results may vary dependent on number of users, number of responsive keywords, number and type of backup tapes, amount
of data on backup tapes, expected delivery time and subsequent discovery requests.
• Increased exposure to spoliation issues
probable
• Original media environment recreation
requires significantly more time and costs
• Final output and review of data that is not
de-duplicated or culled for responsive data is
costly and time consuming
• Legal situation is virtually unknown with little
knowledge of what exists within user files
and emails
• Spoliation issues again probable
• Continued use of backup tapes excludes ability
to develop retention and destruction policy
• Exposes organization to unknown legal
liabilities
In today's often litigious corporate environment, data is more
than just information…its evidence. Federal rules now treat
electronic documents, including email and instant messaging,
the same as paper-based documents. All are viewed as
discoverable. RenewData's Electronic Evidence Services provide
legal professionals with an immediate response capability for
audits, investigations and lawsuits.
Cost Management and Methodology
RenewData's proven cost-management methodology of
electronic discovery allows fast and accurate responses to
client’s needs while controlling costs. An extensive legal and
technology background has enabled RenewData to create a
methodology that is the most expedient and cost-effective in
the industry.
The key to the methodology is the proper architecture and
predictability of the methods for extraction, collection, de-
duplication, filtering and searching data for responsive email
and user files.
• RenewData’s use of tape header and file listings reduces the
amount of collection media to a narrower subset of relevant
tapes.
• RenewData’s non-native environment technology avoids the
additional steps necessary with more traditional data recovery
methods, which can require software licensing and hardware
specific to the original equipment and environment. These
additional steps and requirements can significantly increase
the time and cost involved, in addition to increasing exposure
to risks of lost or damaged data.
• RenewData’s production costs are controlled and minimized
because the billing units, such as number of tapes, gigabytes
of data or PST files, are highly predictable.
• RenewData’s ActiveVault dynamically de-duplicates extracted
data prior to the more traditional and expensive TIFF or paper
generation process, reducing evidence production time
and costs.
• Reduction of responsive documents for outside counsel review
by culling native file data with keyword search methodology
and proprietary de-duplication technology.
• RenewData’s ActiveVault Preservation Manager maintains
files securely, using single-instance storage, thus making sub-
sequent productions from the data highly efficient and less
costly. And moving forward, additional data can easily be
added, while preserving the integrity of the previously
extracted data.
• Using a unique keyword identification methodology,
RenewData experts will help identify strategic options based
on your specific case and how RenewData’s proprietary
technology works. This highly accurate method will limit the
amount of responsive or relevant data, thus saving review
time and costs. RenewData’s highly scalable method
effectively reduces the amount of time to extract the data,
reduces the amount of data available for review through de-
duplication, outputs only the content required and efficiently
stores the final data, when necessary, for future litigation and
discovery request needs.
7
PLANNING
Confronted by aggressive government agencies with low
tolerance and liberal civil discovery laws, many organizations are
unable, at times, to adequately respond to requests because
they don’t know where or how to access responsive data. In
addition, when data is produced, courts are questioning whether
forensically sound methods were used for preservation,
extraction, and production.
When an organization is faced with any litigation or
investigation, RenewData provides knowledgeable guidance to
respond to discovery requests cost-effectively and expediently,
with either strategic or matter-specific response plans.
RenewData’s solutions provide legal and corporate customers
with experts who understand the related case issues and legal
strategies and can effectively communicate with both technical
and legal personnel. This is critical to effectively translate a case
strategy to enable the delivery of the most relevant evidence.
In addition to assessment and planning for production requests,
RenewData’s experts provide solutions that will minimize
spoliation risks, by preserving evidence under documented
chain-of-custody procedures. Expert witness services of court-
experienced, Daubert-challenged professionals, deliver
testimony regarding the processes and tools used by
RenewData.
A unique combination of expertise in law, litigation strategy and
technology enables RenewData to help clients obtain control of
the discovery process and reduce the cost of electronic
discovery.
The methods and processes used have been employed in
hundreds of cases for many of the nation’s largest corporations
and law firms.
Litigation Response Planning
A litigation response plan allows you to achieve a clear
understanding of your situation regarding electronic evidence
and ensures your company meets its legal obligations while
minimizing expenses and business disruption.
RenewData’s technically knowledgeable legal experts will
develop a strategy that meets your litigation response needs
and detailed data gathering, collection and preservation,
processing and data production requirements.
RenewData works with the legal and IT teams to determine
what data is required to preserve, identify the best data
gathering and production techniques, decide what is
technically feasible to collect, and demonstrate to all parties
that your strategy is appropriate to your requirements.
RenewData’s experts will then generate best practice
procedures to follow upon receipt of a discovery request,
preservation order or similar item.
E l e c t r o n i c E v i d e n c e S e r v i c e s
LITIGATION RESPONSE PLAN STEPS
1. Collect, assimilate and document client’s existing legal
strategies, corporate infrastructure topography and
existing evidence production processes and capabilities.
2. Work with General Counsel, Outside Counsel and IT to
design a data gathering, preservation, pleading and
production strategy that aligns to the legal strategy.
3. Provide client with a Litigation Response Plan
containinga detailed report of findings and best-practice
recommendations for procedures and technology to
implement the plan.
Meet and Confer
RenewData legal and technical experts assist companies with
their 26 (f) "meet and confer" conferences by acting as an e-
discovery liaison or consultant. Some of the most common
functions performed by the advisory team are:
Creation of initial disclosures and advising companies
regarding requests for data
• Selection of production formats and review options
• Design of statistical sampling protocols to lessen the burden
of production
• Assistance with generating documents and responses
• Meet with internal staff and interview IT representatives in
order to act as a third-party spokesperson for the IT
department
• Documentation of relevant costs for "cost shifting" analysis
Expert Witness Services
RenewData’s court-experienced, Daubert-challenged, legal and
technical experts have provided hundreds of hours of credible
testimony supporting case-specific objectives for numerous
large corporations and law firms.
In addition, RenewData legal experts have extensive
experience as court appointed experts, acting as neutral
forensic or technology experts for the court. These experts help
interpret highly-technical testimony and provide accurate
descriptions of computer technology and processes.
Tape Reports
Today’s Federal rules treat electronic documents, including
email and instant messaging, the same as paper-based
documents. All are viewed as discoverable, although backup
tapes can be exempted as reasonably inaccessible if used for
disaster recovery purposes. However, the amendments to the
Federal Rules of Civil Procedure have enabled these backup
tapes to be considered as discoverable, as of their adoption on
December 1, 2006.
RenewData can facilitate the proactive auditing process to
help corporations identify data stored on backup tapes so that
appropriate actions can then be taken.
Tape Header Reports
The Tape Header Reports provide a detailed overview
of assessed media, including Media Type, Media
Extraction Software, Media Creation Date, Media
Expiration Date, Image Size (GB), and other statistics.
(Note: information for tape header reports may differ
slightly due to backup software type.)
File Listing Report
File Listing Reports provide a detailed overview of
extracted files from assessed media that has been
loaded into an ActiveVault, and include Folder Name,
Extension, Size, Attributes, as well as Dates/Time
Created, Modified, and Accessed.
RELATIVE TESTIMONY EXAMPLES INCLUDE:
• Electronic discovery results
• Explanation and defense of the chain-of-custody
procedures
• Evidence preservation techniques used
• Processing and production accuracy of data
• Reconstructing computer usage based on forensic
analysis of data
PRESERVATION AND COLLECTION
From the moment a discovery request or preservation order is
received, the data collection and preservation methodology
becomes critical to avoiding spoliation issues. RenewData’s
experts use forensically sound methods to collect and preserve
this crucial evidence.
Data Preservation
Preserving vast amounts of data and being able to effectively
retrieve it without missing pieces can be very time consuming
and costly. To make matters more difficult, much of the data is
often duplicate user files or emails, which can mean redundant
costs. Even more importantly, the inability to manage data makes
organizations extremely vulnerable from a legal exposure
perspective.
RenewData provides legal professionals with an archive solution
that enables evidence capture and preservation of enormous
volumes of data across the entire enterprise.
All data is stored in native file format which significantly reduces
the costs of e-document conversion. RenewData then culls the
native files into responsive subsets of data.
Imaging and Collection
At many companies, after an employee has left the company, the
corporate IT team creates either a backup or forensic image of the
PC or laptop used by the former employee. These images are
typically created with known commercial software such as
Symantec's Norton Ghost or Guidance Software's Encase. This is
typically done in the eventuality that contents from the former
employee's computer are required for future investigations or
lawsuits. Often, these images are stored with little or no
retention policy. This will result in an increasing amount of
storage required over time.
According to the U.S. Department of Labor, in 2005, U.S.
companies experienced approximately 20% annual employee
turnover, with some industries such as Finance, reaching 25%.
Therefore, a company of 10,000 employees will create between
200 and 250 PC images per year. Since most PC images are about
40 gigabytes, this will result in the need for 8 to 10 terabytes of
storage for each year the images are stored. These images are
also not searchable or accessible.
With ActiveVault Preservation Manager, companies have an
alternative to the inefficient storage method used today. As a
managed service, the corporate IT organization can give these
images to RenewData. Once the images are received,
RenewData will extract all email and user files from each image.
This data is loaded into the ActiveVault Preservation Manager
and the images are archived to backup tape. The result is a
searchable, de-duplicated archive of former employee user data
that has chain-of-custody tracking back to the original image.
Tape Extraction
RenewData’s Extraction Suite, based on proprietary software,
enables extraction of files directly from backup tapes or other
media without recreating the original native media environment.
The extraction technology targets only responsive file types,
eliminating the time wasted with restoring irrelevant system files.
E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA’S ACTIVEVAULT PRESERVATION MANAGER ARCHIVES CRITICAL EVIDENCE
Challenge: A global financial and insurance institution under SEC investigation preservation orders,
for the past year, was under subpoena to produce and deliver emails and user files going back several
years. The company was backing up 22 terabytes of data every day to meet the court’s preservation
orders. In addition, the company had 13 locations that all used different backup systems and
environments making it even more difficult to produce and deliver the required data.
Solution: The company turned to RenewData for a solution that could extract large volumes of data
from multiple, complex backup environments for production. In addition, the company needed a
solution for producing evidence for follow on and similar matters. RenewData quickly and cost-
effectively extracted the Exchange and Lotus emails, producing backups for every six months, then
archived the data for follow on matters to the investigation. The patent-pending, non-native
environment extraction technology and single-instance storage in RenewData’s ActiveVault
Extraction Suite enabled efficient processing of the large volumes of data and reduced the amount of
data to be archived, from 350 terabytes down to 22 terabytes.
Results: RenewData was able to exceed the company’s data extraction requirements with a highly
scalable extraction solution and continues production for follow on matters, as well as archiving the
company’s data on an ongoing basis. In addition, RenewData’s ActiveVault Preservation Manager has
enabled the company to archive the company’s data for future matters and investigations, thus
avoiding duplication of the extraction process and enabling the company to implement retention and
destruction policies.
9
C h a i n - o f -
C u s t o d y
E l e c t r o n i c E v i d e n c e S e r v i c e s
This best-of-breed methodology allows reduction of the number
of steps required and keeps your costs down. Data extraction can
be performed from virtually any environment and media, either at
your location or at RenewData’s state-of-the-art, highly secure
facility. In fact, the technology enables non-native environment
extraction from backup environments such as IBM Tivoli Storage
Manager, LEGATO NetWorker and VERITAS NetBackup,
something that other organizations in the industry have not
accomplished.
Forensics
Evidence preservation is a crucial step in any investigation.
RenewData uses the highest standards to protect and preserve
the original media. Using documented procedures that address
security, authenticity and chain-of-custody, RenewData
investigators create a forensic image of the data that includes a
digital signature or fingerprint to ensure its forensic authenticity.
RenewData forensic specialists then identify the most likely
source of potentially relevant data that will be used to determine
computer-related activity. Knowing where to find evidence and
how to manage the data through documented chain-of-custody
processes is crucial in the success of any investigation.
FORENSIC SERVICES INCLUDE
1. Documented and verifiable forensic imaging that
preserves the integrity of evidence.
2. Data extraction and recovery capabilities to access
virtually any data regardless of media, environment or
physical location.
3. Highly skilled and experienced forensic experts to
uncover and interpret even the smallest fragments of
crucial evidence.
4. Secure chain-of-custody procedures to help ensure the
admissibility of the resulting evidence.
The RenewData CoC process is as follows:
1. Original media is received into the RenewData
materials department in a secure receiving room. This
is the location where the RenewData materials
department accepts responsibility for the original
media.
2. The RenewData materials department will document
all pieces of original media in a standard CoC log.
3. A unique RenewData RDC ID number is created for
each original media item and is cross referenced to the
client’s name and the serial number, if any, on the
original media. The RDC ID number is printed on a bar-
code label and affixed to the original media in a manner
that will not affect existing original media labels.
4. Once the CoC is complete, the original media is moved
by the RenewData materials department to the
Production Vault room outside of the processing center.
5. Only original media that is required for processing is
removed from the Production Vault and allowed into the
processing center. All access to original media is
logged.
11
Chain-of-Custody is a concept in jurisprudence which applies to the handling of evidence (“CoC”). Because evidence can be
used in court, it must be handled in a defined manner to minimize later allegations of tampering or misconduct which can
compromise the case.
E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA RETRIEVES EMAIL FILES REQUIRED FOR MULTIPLE MATTERS AND ONGOING
INVESTIGATIONS
Challenge: Confronted with multiple urgent matters and ongoing investigations, a world leading
financial organization needed to retrieve emails and user files that were archived on WORM and other
backup media. The organization was having difficulty retrieving the data from the WORM archives,
which would often take months to produce each time data was required. In addition, the email archiving
system had not worked correctly at times, resulting in large “blackout” time periods of missing archives.
Solution: RenewData was consulted to retrieve data from the organization's email archive system, as
well as from the backup system for the missing blackout periods. RenewData extracted 17 terabytes of
data from the email archiving system using RenewData’s ActiveVault Extraction Suite with non-native
environment technology, which allows extraction of data directly from the backup media without
recreating the original native hardware and software environment. The data was also de-duplicated
and stored in RenewData’s ActiveVault Preservation Manager using single-instance storage, which
resulted in only 6 terabytes of data versus the previous 17 terabytes.
Results: RenewData’s technology enabled extraction of the organization’s email and user file archives
in days versus months and allowed for a fraction of the original data to be stored using ActiveVault’s
single-instance storage technology. The reduction in data also significantly reduced the cost of
document production, as well as the time and costs of legal review. The organization is now able to
efficiently leverage the data stored in the ActiveVault Preservation Manager to better prepare and
respond to follow-on matters, as well as future investigations.
RenewData’s skilled investigators are experts at acquiring and
delivering this evidence from virtually any environment, email or
file type including deleted, encrypted and password-protected
files. RenewData’s investigators then examine and piece together
the details of the evidence. With this information, RenewData
provides detailed analysis and interpretation of retrieved data,
and delivers comprehensive reports, based on targeted
investigation objectives.
Computer Investigations
RenewData experts have extensive investigative experience
involving computer activity and transactional investigations.
RenewData investigators work with clients to develop a plan of
what and whom to target, to ensure that critical data is not
overlooked. Investigators can go on-site to inventory data and
look for hidden sources, as well as help you prepare for
depositions, discovery requests and litigation.
Using RenewData’s patent-pending, proprietary technology,
engineers extract the suspected user activity files and data. The
non-native environment technology allows data extraction on-site
or at RenewData’s facility from virtually any media or computer
environment. It also enables recovery of both active and deleted
data from inaccessible media and deleted files. RenewData
technology also simultaneously de-duplicates and culls data,
making review of the data more efficient and less costly.
Utilizing years of investigative experience, RenewData forensics
experts interpret and analyze the evidence gathered and provide
a detailed report to support the analysis and conclusions. This
evidence is produced in virtually any format or media required for
the specific needs of the case including native files, printed
documents, multiple electronic formats or loadable to review or
storage repositories.
TYPICAL STEPS OF AN INVESTIGATION
1. Client provides access to system and/or facilities for
RenewData to collect evidence.
2. RenewData’s expert creates a forensic image of the
original media which preserves the exact contents of
the media at time of acquisition.
3. RenewData’s forensic expert consults with client to
identify most likely sources of evidence.
4. User activity files and data are extracted from the
media such as tapes or hard drives.
5. RenewData's forensic expert interprets and analyzes
the evidence gathered and provides client with a report
of findings.
6. Production of the final evidence is produced for client in
required format.
7. RenewData's forensic expert provides testimony when
necessary to prove proper chain-of-custody procedures,
collection methodologies and scientifically-based
conclusions.
User activity files and data are retrieved from such
sources as:
• Electronic mail
• Internet/Intranet files accessed
• Documents and files created, accessed and deleted
• Times of user creation, access or deletion
• Server and gateway log files
• Phone and voice records
13
PROCESSING
RenewData provides dynamic de-duplication for large volumes of
information and helps ensure that unique metadata and original
content are stored only once. The result is that less time is
needed for processing of significantly more media and less
storage space is required for the resulting data.
Electronic documents are processed with complete text and
metadata preserved and indexed for search accuracy. Virtually
any type of media may be processed for emails and user files and
the RenewData methodology minimizes the amount of data
channeled into the reviewing tool and subsequent production of
the data.
File/Keyword/Date Filtering
When filtering data, RenewData has a set of processes to not
only incorporate the basic instructions provided (i.e., file types,
keywords, dates), but that also consider the true intent of their
clients. RenewData utilizes their industry expertise and
proprietary technology in order to identify all applicable data that
meets their client's objectives.
File Filtering and Introspection
Some solutions rely on the file extension to identify the file type.
However, the file extension is not mandatory and there is no
guarantee the file extension accurately reflects the content of the
file. Merely relying on the stated file extension is not dependable
as it is simple to modify file names and extensions. For example,
a Microsoft Word document with the file name "Trade
Process.doc" can be renamed to "logfile.sys". Checking only for
file type by extension would not identify the actual file type and
content as a Microsoft Word file. ActiveVault avoids the issues
associated with using a file's extension by employing a
verification process during the loading of your data called
Introspection.
Introspection is the ability for ActiveVault to analyze file content
to determine its file type. Introspection will detect the
discrepancy between the declared file-content type and the
actual file-content type. Using the previous example,
Introspection would detect that the content of "logfile.sys" is
actually data from Microsoft Word and therefore potentially
relevant and ensure this file is loaded. Without ActiveVault
Introspection, it is easy to miss data when file extensions have
been changed.
Keyword Search
The ActiveVault Search Engineers and Engagement Managers
work closely with the client to understand the intent of the
keywords (particularly complex) and the type of documents they
are looking for. Then, they take full advantage of the search tools
by deploying a search methodology that maximizes relevancy.
RenewData tests and fine-tunes the results by utilizing a variety
of reports and/or sampling techniques. Often, RenewData is
brought in prior to and during "meet and confer" conferences to
advise, sample, or run reports on the data in order for our clients
to be fully armed with expert advice.
E l e c t r o n i c E v i d e n c e S e r v i c e s
Custom Reports
The following custom reports may be used before a meet and
confer or during the processing step of the e-discovery:
• Extraction Reports provide a high level overview of completed
extractions from assessed media and includes information
regarding the extensions extracted, number of files extracted,
and amount of spaced used during extraction.
• Keyword Search Reports provide a detailed overview of
keyword such results for completed processed files.
• Date Range Reports provide a high level overview of
processed message history over time for completed processed
files, and include Volume ID, Month, Message Count History,
and other statistics.
Custodian Targeting
In order to further cull down the data for relevant information,
RenewData targets specific custodians. Clients provide custodian
names, however locating those custodians can present a
challenge as companies use a variety of naming convention
variables in both their email and file listings. It is the industry
expertise of RenewData that enables the analyzing and manual
targeting of those custodians. RenewData works with clients to
investigate and identify the appropriate custodian, or if the client
prefers, RenewData may generate reports that may assist the
client in their targeting:
• Known Mailbox Reports provide a detailed overview of user
mailbox files successfully extracted and loaded into an
ActiveVault, and include Mailbox Name, PST Volume,
Message Creation Dates, Message Sent Dates, and other
statistics.
• Known User File Reports provide a detailed overview of user
files successfully extracted and loaded into ActiveVault, and
include ActiveVault Category, File Extension Type, File
Extension Description, Number Of Files, and Size of Files.
• Unknown Mailbox Reports provide a detailed overview of user
mailbox files that were either unable to be processed after
extraction or successfully processed but unable to be loaded
into an ActiveVault, and include Volume ID, Mount Points,
Physical Media ID, Job ID, Media Creation Time, Message
Mailbox File Name, Message Count, and other statistics.
15
E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA SAVES GLOBAL FINANCIAL INSTITUTION FROM MASSIVE FINES
Challenge: Facing a federal investigation and significant potential daily fines, a global financial
institution with assets of more than $334 billion needed to produce emails for certain individuals and
specific dates in approximately 12 days. The company stored email files on backup tapes at each of its
U.S. locations which needed to be shipped to their main headquarters for processing. The backup tapes
were considered original evidence and could not leave their facility.
Solution: The financial institution made the call to RenewData on Friday. RenewData investigated the
client's needs and delivered a scope of work by Wednesday. The following Friday, RenewData
dispatched a team to go onsite. RenewData's electronic evidence experts processed 122 backup tapes,
equal to more than 854 million text pages, to extract the specific email files. RenewData's professionals
went straight to the data without recreating the native environment of the original hardware and
software used to create the emails. Utilizing its proprietary technology, RenewData delivered the
needed emails to the financial institution on Tuesday, a day ahead of schedule.
Results: The financial institution was able to deliver the email files to the federal agency in time,
consequently saving their company significant daily fines. With RenewData's proprietary technology,
the company also saved additional time and money as there was no need to recreate the native
environment of the emails, a requirement of many competitors.
Loose PSTs and NSFs also can be problematic, as roughly 90% of
these files are not identified with a custodian name. In order to
identify the custodian, custodian mapping must be performed.
This can be extremely expensive because it is a forensic
operation. However, RenewData has a proprietary tool that can
automatically identify the custodian, as well as identify and
eliminate invalid PSTs, saving time and money.
RenewData can merge email on the Exchange Database with
archived email for the same custodian and then de-duplicate
against all, delivering less data for review, and ultimately, for
production.
Proactive Evidence Archiving
The process of capturing and preserving an organizations'
electronic data on an ongoing basis provides significant
reductions of time and money in preparing for current or future
electronic evidence productions. This capability offers the
highest advantage for corporations in responding to audits,
investigations and lawsuits because it provides an accessible
view of electronic evidence across the entire enterprise.
Using a proactive evidence preservation approach, a General
Counsel, the head of corporate litigation, or a third party advisor,
has the tools to assess the company’s legal exposure early in the
litigation process or even before litigation begins.
Advantages of this approach include:
• Quick assessment of legal exposure and better preparation
for subsequent discovery requests.
• Control of litigation costs with the ability to plan strategies
based on real knowledge of your situation.
• Significantly reduced timeframes to produce initial and
subsequent production requests as pre-processed and
indexed native file data is available for immediate search and
output.
• Preparing for future investigations or matters may be
as simple as searching data or adding incremental
data to the existing ActiveVault. This eliminates the
need to reprocess the same backup tapes multiple
times for new matters or subsequent requests.
Multi-Matter Evidence Archiving
RenewData can also offer off-site electronic evidence
preservation and record archiving for single legal matters. This
non-invasive approach works from existing backup tapes and
requires no software installation in an organization's
environment. An ActiveVault preservation archive can be
implemented in a variety of methods based upon the legal and
business requirements.
One or more of the following implementation methods can be
used to create the ActiveVault, including the archiving of:
• Matter specific email and user file data
• All historical email and user file data from a set time period
• All current and future email and user file data
• Email and user file data for only specific target users from a
set time period
Advantages of this approach include:
• No software to install into your IT infrastructure
• No business disruption
• No capital purchase
• Significantly lower storage costs than if done in-house
17
S u c c e s s
19
RENEWDATA, TRUSTED ELECTRONIC EVIDENCE ADVISOR TO A GLOBAL SEMICONDUCTOR COMPANY
Challenge: In a preemptive move prior to receiving an electronic evidence production request related
to a government investigation, the outside counsel firm of a global semiconductor company looked
to RenewData’s experts to design a process for ensuring preservation compliance. RenewData’s
consulting services were engaged to create a step-by-step process to comply with discovery requests
employing computer forensic methodology — the Litigation Response Plan (“LRP”). The outside
counsel believed that having such a plan prior to the discovery request would enable the
semiconductor company to significantly minimize the risk of inadvertently overlooking relevant
electronic documents or being accused of spoliation.
Solution: When the discovery request was received, the outside counsel had a well defined process
for gathering the required electronic information in a forensically sound manner. They instructed
RenewData to apply its expertise in acquiring 30 hard drives and three multi-drive servers - including a
server in an international location - over one weekend. RenewData used its unique culling process to
de-duplicate the data, filter, and deliver for only responsive information for privilege review from the
initial data collection as well as subsequent data inputs from other sources. This resulted in decreased
costs and a reduction of the review period by 80%. In summary, RenewData's LRP services reduced
both risk and discovery costs for the law firm's client.
REVIEW
RenewData provides review of the resulting data using iCONECTnxt
review software or if a client prefers can export load files, TIFFs or
links to native for use in other review tools.
As an Application Service Provider for iCONECTnxt, RenewData
enables firms to perform coding, redaction, Bates numbering,
foldering and other review activities on the data. This means your
data never has to leave the RenewData facility, thus ensuring an
increased level of security and integrity of the data.
Review is performed online using a secure web tool that enables for
online review from any location. The web-based system ensures
that all parties involved have equal access to the data. Additionally,
the tool allows reviewers to export the Bates numbered TIFFs of
their choice without requiring vendor assistance. Documents are
available for review in either their native file format or in TIFF
format. The native format uses a viewer that allows viewing of over
350 file types without having to install the applications or any
special plug-ins.
iCONECT Hosting and Review
iCONECT software enables review and management of electronic
and document discovery from anywhere in the world for effective
collaboration with outside counsel, branch offices, and consultants.
With iCONECT software, your review teams can increase
productivity, save time, and lower your litigation costs by taking
advantage of:
• Global web-based access to case information and document
discovery e-mail, native files, images, transcripts, and
documents), so counsel, clients, and experts can work together
on case materials and provide immediate feedback.
• Secure multi-level access, so experts can view only the
information they need to see while sensitive data stays locked
down.
• Case management tools — including a centralized case
calendar, tasks list, and contacts list — that enable counsel,
clients, and experts to stay in sync. Clients can log in to see
what’s coming up.
• Native file viewing in iCONECT’s image viewer that allows you
to streamline your workflow and review over 350 native file
types (including Excel, PDF, and Word) with no plug-ins or
special software required, and save time with bulk-review
options, review templates, and automatic foldering by review
designation.
PRODUCTION
Production and delivery of the client’s responsive documents is a
crucial step in the litigation process. RenewData’s Production Suite
and expertise allow creation of tailored evidence production
solutions designed to address reactive litigation or investigation
matters. RenewData’s experts will help you understand the
advantages of each option and then identify the best direction
based on client specifications.
In addition, the de-duplication of the data prior to the more
expensive production process results in significantly less time and
cost required for production of your responsive data. Delivery of
evidence can be produced in virtually any format or media necessary
to suit the needs of a case.
E l e c t r o n i c E v i d e n c e S e r v i c e s
DOCUMENT PRODUCTION OPTIONS
• Native files
• Merged PST files
• TIFF files
• PDF files
• Printed copies of documents
• Load files for litigation repositories
• Custom reporting to suit the needs of your case
• Download into ActiveVault storage for future needs
Te c h n o l o g y
21
Technology
ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM
Extraction Suite is designed to image media, extract files
from media and load data into the Preservation Manager. In
order to reduce the likelihood of damaging original media,
typically backup tapes or hard drives, RenewData first
makes a forensic image of the media. All extraction
processing is then completed using the forensic images.
For extracting data from backup tapes, RenewData
has created a suite of non-native environment extraction
software for IBM Tivoli, LEGATO/EMC, VERITAS, Computer
Associates ARCserve, CommVault Galaxy, Hewlett-
Packard and other leading manufacturers.
RenewData uses dynamic de-duplication when loading data
into the Preservation Manager. This process creates a digital
fingerprint using a hash value upon loading, ensuring no
duplicates are loaded and stored in the system.
Discovery Engine is optimized for native file culling and
filtering by keywords and date ranges. The Discovery Engine
can rapidly and accurately index and manage virtually any
native file format. Built on the Oracle database platform, the
Discovery Engine offers unparalleled industry performance
for searching large volumes of native files. Data can be
managed by original source, custodian or data type. A
complete forensic audit trail enables automatic chain-of-
custody tracking back to the original source media.
Production Suite provides multiple production output
options of native file evidence using a flexible de-
duplication methodology. Output can be de-duplicated either
within a single custodian or across multiple custodians.
Production options include native file output, load files with
TIFF or PDF images for popular litigation repositories such as
Concordance and Summation, or in paper format using local
printing partners.
Preservation Manager is a forensically-sound repository
designed for native file data management of email
messages, attachments and user files by legal
professionals. Optimized for managing large volumes of
files, Preservation Manager uses a single-instance storage
("SIS") model in order to store data that is a fraction of its
original size.
The capabilities enabling the storing of data in a forensically
sound manner include:
• Each email message can be traced to the originating
container (i.e. Microsoft Exchange “EDB” file or loose
“PST” file) and the originating source media.
• A user’s email can be recreated at any point in time.
• The history of each email message can be traced
between multiple email server backups, showing when
an email may have disappeared or was moved to a
different folder.
Te c h n o l o g y
23
Additionally, ActiveVault technology is optimized for:
• Scalability - High speed and high volume data extraction from
thousands of backup tapes per day, regardless of the backup
system.
• Capacity - Hundreds of terabytes of evidence can be
processed in a forensically and cost-effective way for multiple
production requests.
• Speed - The ability to extract, index, search and output large
volumes of email and user files in hours and days, rather than
weeks or months.
For a recurring monthly fee, RenewData provides its customers
with secure archiving of their corporate information or electronic
evidence in a proprietary, indexed, searchable data warehouse.
This data warehouse is forensically sound, utilizes RenewData’s
single instance storage technology to minimize storage
requirements and can rapidly produce legal output in a variety of
appropriate formats. In addition, this warehouse can be used by
customers to provide review and management capabilities that
enable them to access their information.
ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM
RenewData’s ActiveVault Evidence Management Platform
("ActiveVault") is the electronic evidence industry's leading
technology platform for media and data extraction, native file
filtering and production output. ActiveVault allows for the
extraction of electronic information from virtually any electronic
media or computer environment without recreating the native
environment in which the data was stored. As the extracted
data flows off of the media, ActiveVault dynamically de-
duplicates the information while maintaining records about the
data, such as where the duplicate files were located.
This patent-pending platform is designed for rapid execution of
large scale projects enabling large volumes of data to be
processed in the most expeditious manner. ActiveVault is
designed to ensure that legal professionals can achieve their
schedules, maintain high levels of quality and control the
expense of electronic evidence management. This proprietary
platform is not sold or licensed as a separate product and is a
key component of the ComplianceNOW, PreservationNOW and
eDiscoveryNOW offerings.
ACTIVEVAULT SINGLE-INSTANCE STORAGE (SIS)
Single-instance storage (“SIS”) is a system’s ability to keep one
copy of content associated with multiple custodians.
For user files, ActiveVault creates a hash value, which is a digital
fingerprint, for the document body and metadata of each user file.
Each user file is de-duplicated upon loading into the AV
Preservation Manager with forensic references to the source file
path and media.
In order to understand how SIS works for email, you must first
understand the parts of an email message. An email message
within Microsoft Exchange server is not stored as a single file.
Instead, it is stored in a database with tables and fields that hold
the data necessary to construct an email message. For example,
when a person wants to view an email message in Microsoft
Outlook, the details of the Inbox folder actually reside in a
database table on the Microsoft Exchange email server. When
someone wants to read a message, Microsoft Exchange takes the
information from all required database tables and combines this
information invisibly to the user so Outlook can then display the
result as a complete email message.
In the database, an email consists of the message body, location
pointers and item properties stored in database tables. The
location pointers and item properties comprise the metadata of a
message. One table in the database, the message table, holds
the message body. Another database table, the message folder
table, holds all of the location pointer information ("References").
Other database tables hold the item properties (e.g. To, From, CC,
BCC, Subject Line, etc.).
The message body can be in multiple formats depending on the
originating email client software. Therefore, a single email body
may actually have multiple formats that must be stored such as
HTML, ASCII Text and Rich Text format. An email with rich text
may appear in Microsoft Outlook with formatting but appears as
plain text in a Blackberry. The Preservation Manager stores
all of these message body formats.
In the case of email, like Microsoft Exchange, ActiveVault’s
single-instance storage method holds one copy of the message
body and attachments within the database. Duplicate references
access the content through a set of database pointers and other
properties, such as message senders and their recipients, which
allow the content to have one-to-many references. For example,
an email sent to 10 people is stored within the Preservation
Manager as a single email body with 11 database record
references of the message. The Preservation Manager stores
other popular email formats, such as Lotus Notes, in the same
method.
In order to ensure the forensic accuracy of SIS and to identify
duplicates, when email data is loaded into Preservation Manager,
RenewData creates digital fingerprints using a hash value for
both the message metadata and the message body.
The SIS model typically reduces the amount of data stored in the
Preservation Manager by 60 - 90%, thus reducing the cost of
storage and increasing search speed. This capability is enabled
by patent-pending technology and is unique to RenewData within
the evidence preservation market.
Te c h n o l o g y
25
Technology
EXAMPLE OF SINGLE INSTANCE STORAGE
“SAME EMAIL IN 3 SEPARATE LOCATIONS“
EXAMPLE OF SINGLE INSTANCE STORAGE
“SAME WORD DOCUMENT IN 3 SEPARATE LOCATIONS“
CREATING DIGITAL FINGERPRINTS WITH HASH VALUES
RenewData has implemented industry standard technology to
ensure the integrity of our customer’s data. RenewData uses
hash values to:
• Identify every message, document or file with a digital finger-
print at the start of the production process
• De-duplicate messages, documents and files by comparing
hash values for matching values
• Validate the final production output of messages, documents
and files did not change during processing
By using hash values during validation of the files, RenewData
can ensure the documents extracted from a client's backup
medium are forensically identical to the files delivered
in a production to the client.
What is a Hash value?
“A ‘hash’ (also called a “digest”) is a kind of ‘signature’ for a
stream of data that represents the contents. The closest real-life
analog we can think of is ‘a tamper-evident seal on a software
package’: if you open the box (change the file), it’s detected.”1
The algorithms utilized in creating a hash can detect the
minutest change in the structure of the data stream. For example
the MD5 and SHA-1 hash for:
“The quick brown fox jumped over the lazy dog” are
SHA-1 HASH: f6513640f3045e9768b239785625caa6a2588842
MD5 HASH: 08a008a01d498c404b0c30852b39d3b8
A minor change, such as changing the “d” in dog to “c” results
in an entirely different hash value:
“The quick brown fox jumped over the lazy cog”
SHA-1 HASH: 68361d3bafa5fc245e16c9654f4ec32531535207
MD5 HASH: bd266017bcad42c85a57cc3ae5851bf8
Hash values will even change for changes in punctuation:
“the quick brown fox jumped over the lazy dog”
SHA-1 HASH: 6039d1003323d48347ddfdb5ce2842df758fab5f
MD5 HASH: bb0fa6eff92c305f166803b6938dd33a
It should be noted that hashes are “digests” of files, not the
“encryption” of a file. Encryption is a two-way operation which,
given the right keys, transforms data from a clear text to cipher
text and back. Hashes, on the other hand, compile a stream of
data into a small “digest” that is a unique representation of the
data stream. Hashes are utilized in verifying file integrity, hash
passwords and digital signatures.
Different Hash Algorithms
There are a number of hash algorithms which are utilized today
to create hash values. The most popular is the MD5 hash, a 128-
bit algorithm, which was originally thought to be
cryptographically secure. In August, 2004 a discovery was made
that a “collision” could be created using a digest created with
the MD5 hash. A “collision” occurs when two different data
streams generate the same hash value.
“Because of the discovery of an easy method for generating
collisions, many researchers recommend that replacement
algorithms, such as SHA-1 or RIPEMD-160, be used instead of
MD5.”2
RenewData employs the longer 160-bit SHA-1 hash algorithm to
ensure the integrity of data in ActiveVault Evidence
Management Platform. The SHA-1 hash is one member of a set
of related cryptographic hash functions designed by the National
Security Agency (NSA) and published by the National Institute of
Standards and Technology (NIST).
Te c h n o l o g y
27
Technology
CREATING A HASH VALUE
The creation of a hash value for a file involves the processing of a variable length message into a
fixed-length output. A hash function must be able to process an arbitrary-length message into a fixed-
length output. In practice, this can be achieved by breaking the input up into a series of equal-size
blocks, and operating on them in sequence using a compression function. Most widely-used hash
functions take the form in the diagram below.
In the diagram, a message is segmented into fixed-length blocks and are compressed to an output of the
same size. The combination of the compressed blocks equals the hash value for the entire message.
1 Unixwiz.net Tech Tips, “An Illustrated Guide to Cryptographic Hashes” by Steve Friedl.
2 Wikipedia the Free Encyclopedia, “MD5 (Message-Digest algorithm 5)”, http://en.wikipedia.org/wiki/MD5.
3 Federal Information Processing Standards Publication 180-1, 1995 April 17, Standard for Secure Hash Standard.
“The SHA-1 is called secure because it is computationally
infeasible to find a message which corresponds to a given
message digest, or to find two different messages which
produce the same message digest. Any change to a message in
transit will, with very high probability, result in a different
message digest, and the signature will fail to verify.”3
ACTIVEVAULT DE-DUPLICATION PROCESS
De-duplication is the process of removing forensically identical
copies of email messages or files from the production set. Other
vendors in the industry must perform de-duplication as a
separate process because they do not utilize a single-instance
storage model in their systems. Because RenewData already
stores de-duplicated data within ActiveVault, there is no
additional de-duplication that is necessary upon output. Instead,
ActiveVault sometimes must repopulate email files with
messages or directories with user files in order to meet client
"de-duplication" requirements.
RenewData's standard production output repopulation
options are:
Full Repopulation (equivalent to no de-duplication)
• Native Email: The email file includes all messages for the
target user including duplicate messages in all locations.
• Native User Files: The user directories contain all files for the
target user including duplicate files in all locations.
Single-Instance Repopulation Within Target User
(equivalent to within custodian de-duplication)
• Native Email: The email file includes one instance of each
message in the folder by alphabetical sort order where it
resides. Therefore, if message #1 resides in two folders,
Folder A and Folder B, then one output, message #1 will be
included in the email file only in Folder A.
• Native User Files: The user directories contain only one
instance of each file across all locations.
Single-Instance Repopulation Within Folders or
Directories within Target User (equivalent to within
custodian de-duplication)
• Native Email: The email file includes one instance of each
message in any folder where it resides. Therefore, if message
#1 resides in two folders, Folder A and Folder B, then one
instance of message #1 will be included in the email file in
each respective folder.
• Native User Files: The user directories contain only one
instance of each file in each respective directory.
Global Single-Instance Repopulation (equivalent to global
de-duplication)
• Native Email: Only one instance of each message will reside
across all target users.
• Native User Files: Only one instance of each user file will
reside across all target users.
NATIVE TAPE RESTORE VS. NON-NATIVE TAPE
EXTRACTION
Native tape restoration is an IT process whereby all files on a
backup tape are restored to a computer hard drive. The IT staff
uses this process to recover a computer that has crashed. In order
to perform a native tape restoration, someone needs to setup and
configure a computer with the correct type of backup software.
While this option seems simple, there are many complexities. For
example, this process typically works for user files and simple
non-threaded backup software such as Computer Associates
ARCserve and Veritas Backup Exec. However, the native restore
process is much more complex for threaded backup software such
as Tivoli Storage Manager, LEGATO Networker, VERITAS
NetBackup and for email servers.
When restoring files from a threaded backup system, a
database called the catalog or library is required from the
original backup system. When restoring email, the email server
must be set up and configured exactly as the original server.
Native tape restoration typically works well for small volumes
of tapes, however, the cost of computer hardware and software
licensing dramatically increases the cost of restoring tapes on a
large scale. For user files, all files must be restored before de-
duplication can occur. This requirement makes it possible to
overwrite files with the same file name but different contents
and requires twice the amount of storage space for processing.
Non-native tape extraction, RenewData’s method using the
ActiveVault Evidence Management Platform, does not need to
recreate the native environment. Instead, RenewData uses
multiple pods, each pod being a computer with four (4) tape drives,
to create an image of each backup tape onto a hard drive. The
backup tape images are then processed to extract only the
necessary files needed for restoration by using date and file
extension filtering. When this occurs, all files are dynamically de-
duplicated using the SHA-1 hash so only de-duplicated files are
placed onto hard drives; thereby significantly reducing the amount
of required storage space. Email server databases from Microsoft
Exchange and Lotus Notes are then processed in the same manner,
never requiring native email servers to be set up and configured.
This highly efficient process is faster and less expensive than
native restoration, providing significant cost savings to
RenewData’s clients.
Te c h n o l o g y
29
Using RenewData Technology Not Using RenewData Technology
Extract data from 100 backup tapes
.5 days
Load extracted data for 10 target users into ActiveVault
and store in de-duplicated format (data readily
available from storage for follow-up requests) 2 days
Keyword filtering and production (10 target
users, 10 keywords) 2 days
Total 4.5 days
Recreate native media environment, including
hardware and software purchase, setup & testing 23 days
Restore 100 backup tapes to native environment
and output data (data not readily available for
follow-up requests) 37 days
Keyword filtering and production (10 target
users, 10 keywords) 4 days
Total 64 days
(does not include de-duplication)
Time savings based on a hypothetical project. Your results may vary depending on number and type of backup tapes, amount of data,
number of users and number of responsive keywords.
T h e C o m p a n y
31
COMPANY PROFILE
RenewData Corp.®
a privately held company, was formed in 2001
by combining the assets and expertise of two companies, DSTX
Limited and Progressive Data Recovery. This combination brought
together a group of highly accomplished legal and technology
experts who recognized a growing legal need for fast retrieval of
large volumes of electronic data to be used for evidence.
RenewData is a leading provider of electronic evidence services
and data migration for corporations and law firms that need
strategic proactive and immediate reactive solutions for audits, e-
discovery and investigations. RenewData's superior legal
expertise features litigation response planning, forensic
investigation services, electronic data extraction, litigation
production services, evidence preservation archiving services and
Daubert-challenged expert witness services.
The uniqueness of RenewData's approach is a combination of
being a strong legal services company supported by market-
leading extraction and archiving technology that enables high
speed, high volume processing of data directly from electronic
communications systems and indirectly from legacy or complex
backup or computer systems.
RenewData takes great pride in providing legal and technical
proficiency, as well as exceptional client relationships and
meticulous attention to detail. We evaluate every client's specific
needs, then provide the most cost-effective and timely solution.
Our customer testimonials are proof that we have succeeded and
we will continue to make client solutions our first priority.
T h e C o m p a n y
33
S e c u r i t y
HIGH SECURITY STATE-OF-THE-ART FACILITY
RenewData’s state-of-the-art processing center is designed to ensure that critical, one-of-a-kind
electronic evidence is securely and safely managed against theft, fire and loss. This type of evidence
safeguarding is increasingly important for today's corporations and RenewData has addressed this
need with a facility that utilizes the latest security system technology.
RenewData’s processing facility features multiple layers of security and safety devices to
protect the integrity of the critical data including:
• Government-level physical security
• Multi-zoned, role-based security access system requiring both photo ID keycards and fingerprint
biometrics
• Video cameras with digital recording throughout the facility to monitor movement and activity
• Double-door access to the production facility. This “man trap” access requires the first door to
close before the security system allows the second door to open
• Interior walls composed of either concrete or steel plating
• Redundant power and cooling systems
• Dry chemical fire suppression system
• Secure Production Vault for evidence receiving and chain-of-custody documentation
• Secure vault for work-in-process storage
• Secure vault within processing center for highly-sensitive evidence processing
• 24x7 facility monitoring by ADT Security Services
Corporate Headquarters
9500 Arboretum Blvd.
Suite 130
Austin, TX 78759
512.276.5500 Office
888.811.3789 Toll-Free
512.276.5555 Fax
E-mail:
info@renewdata.com
www.renewdata.com
Copyright © 2007 Renew Data Corp. All rights reserved. RenewData, the sphere logo and ActiveVault are registered trademarks of Renew Data Corp.
All other company and product names may be trademarks of their respective owners.

More Related Content

What's hot

Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recovery
EMC Forum India
 
Corporate Awareness Litigation
Corporate Awareness  LitigationCorporate Awareness  Litigation
Corporate Awareness Litigation
dkarpinsky
 
Wp go daddyvalidation_march13
Wp go daddyvalidation_march13Wp go daddyvalidation_march13
Wp go daddyvalidation_march13
Kalen Kimm
 
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
Dana Gardner
 
Tender Care Pediatric Dentistry
Tender Care Pediatric DentistryTender Care Pediatric Dentistry
Tender Care Pediatric Dentistry
rheezy777
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
wericsmith
 
N2 s presentation building
N2 s presentation buildingN2 s presentation building
N2 s presentation building
network2supplies
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
IBM India Smarter Computing
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
Bilcare Research
 
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
Dana Gardner
 
Unlocking the Intelligence in Big Data
Unlocking the Intelligence in Big DataUnlocking the Intelligence in Big Data
Unlocking the Intelligence in Big Data
Intel IT Center
 
Curlew Research Brussels 2014 Electronic Data & Knowledge Management
Curlew Research Brussels 2014 Electronic Data & Knowledge ManagementCurlew Research Brussels 2014 Electronic Data & Knowledge Management
Curlew Research Brussels 2014 Electronic Data & Knowledge Management
Nick Lynch
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 
UpSkills: Research Data Management for the Sciences
UpSkills: Research Data Management for the SciencesUpSkills: Research Data Management for the Sciences
UpSkills: Research Data Management for the Sciences
stevage
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
Blancco
 

What's hot (15)

Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recovery
 
Corporate Awareness Litigation
Corporate Awareness  LitigationCorporate Awareness  Litigation
Corporate Awareness Litigation
 
Wp go daddyvalidation_march13
Wp go daddyvalidation_march13Wp go daddyvalidation_march13
Wp go daddyvalidation_march13
 
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
 
Tender Care Pediatric Dentistry
Tender Care Pediatric DentistryTender Care Pediatric Dentistry
Tender Care Pediatric Dentistry
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
N2 s presentation building
N2 s presentation buildingN2 s presentation building
N2 s presentation building
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
 
Unlocking the Intelligence in Big Data
Unlocking the Intelligence in Big DataUnlocking the Intelligence in Big Data
Unlocking the Intelligence in Big Data
 
Curlew Research Brussels 2014 Electronic Data & Knowledge Management
Curlew Research Brussels 2014 Electronic Data & Knowledge ManagementCurlew Research Brussels 2014 Electronic Data & Knowledge Management
Curlew Research Brussels 2014 Electronic Data & Knowledge Management
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
UpSkills: Research Data Management for the Sciences
UpSkills: Research Data Management for the SciencesUpSkills: Research Data Management for the Sciences
UpSkills: Research Data Management for the Sciences
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
 

Viewers also liked

Cannabis...
Cannabis...Cannabis...
Cannabis...
Lumus01
 
Administracion por valores parte 1 para gerentes de salud
Administracion por valores  parte 1 para gerentes de saludAdministracion por valores  parte 1 para gerentes de salud
Administracion por valores parte 1 para gerentes de salud
Katiuska Alvayero
 
2016,10 YEC勉強会
2016,10 YEC勉強会2016,10 YEC勉強会
2016,10 YEC勉強会
両角 達平
 
MAY COOP
MAY COOPMAY COOP
MAY COOP
YANA Kramer
 
CV-PHScc
CV-PHSccCV-PHScc
2013_DS5_FinalReview_11N1137_外出先は住宅
2013_DS5_FinalReview_11N1137_外出先は住宅2013_DS5_FinalReview_11N1137_外出先は住宅
2013_DS5_FinalReview_11N1137_外出先は住宅Yoshihiro Mutoh
 
Tunnel boring machine
Tunnel boring machineTunnel boring machine
RiccoTek Presented SNL Plummer Block Housings
RiccoTek Presented SNL Plummer Block HousingsRiccoTek Presented SNL Plummer Block Housings
RiccoTek Presented SNL Plummer Block Housings
RICCOTEK Bearing Co.,LTD
 
Why Qatar Needs a New Technical Vocational Education and Training Strategy Now
Why Qatar Needs a New Technical Vocational Education and Training Strategy NowWhy Qatar Needs a New Technical Vocational Education and Training Strategy Now
Why Qatar Needs a New Technical Vocational Education and Training Strategy Now
Wesley Schwalje
 

Viewers also liked (12)

Dia2 cinza
Dia2 cinzaDia2 cinza
Dia2 cinza
 
Cannabis...
Cannabis...Cannabis...
Cannabis...
 
Administracion por valores parte 1 para gerentes de salud
Administracion por valores  parte 1 para gerentes de saludAdministracion por valores  parte 1 para gerentes de salud
Administracion por valores parte 1 para gerentes de salud
 
Presentation1
Presentation1Presentation1
Presentation1
 
2016,10 YEC勉強会
2016,10 YEC勉強会2016,10 YEC勉強会
2016,10 YEC勉強会
 
MAY COOP
MAY COOPMAY COOP
MAY COOP
 
CV-PHScc
CV-PHSccCV-PHScc
CV-PHScc
 
2013_DS5_FinalReview_11N1137_外出先は住宅
2013_DS5_FinalReview_11N1137_外出先は住宅2013_DS5_FinalReview_11N1137_外出先は住宅
2013_DS5_FinalReview_11N1137_外出先は住宅
 
Dia2 rosa
Dia2 rosaDia2 rosa
Dia2 rosa
 
Tunnel boring machine
Tunnel boring machineTunnel boring machine
Tunnel boring machine
 
RiccoTek Presented SNL Plummer Block Housings
RiccoTek Presented SNL Plummer Block HousingsRiccoTek Presented SNL Plummer Block Housings
RiccoTek Presented SNL Plummer Block Housings
 
Why Qatar Needs a New Technical Vocational Education and Training Strategy Now
Why Qatar Needs a New Technical Vocational Education and Training Strategy NowWhy Qatar Needs a New Technical Vocational Education and Training Strategy Now
Why Qatar Needs a New Technical Vocational Education and Training Strategy Now
 

Similar to RenewData Corporate Brochure

Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discovery
wlucina
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
Jeff Kubacki
 
Visibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructureVisibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructure
Marie Wilcox
 
Epiq E Discovery Faq Hong Kong
Epiq E Discovery Faq Hong KongEpiq E Discovery Faq Hong Kong
Epiq E Discovery Faq Hong Kong
DmitriHubbard
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery Perspective
Russ Gould
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009
SBHPatrick
 
March 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinarMarch 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinar
David Kearney
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
Darrin Campbell
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
Darren Gallagher
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery
David Kearney
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
David Kearney
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
Osler, Hoskin & Harcourt LLP
 
Altlaw competitors checklist
Altlaw competitors checklistAltlaw competitors checklist
Altlaw competitors checklist
Matthew Altass
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective Archiving
EMC
 
TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data Archiving
RainStor
 
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessMobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
Sasha Levage
 
Technologent-CS-Disaster_Recovery_Business_Continuity-Energy
Technologent-CS-Disaster_Recovery_Business_Continuity-EnergyTechnologent-CS-Disaster_Recovery_Business_Continuity-Energy
Technologent-CS-Disaster_Recovery_Business_Continuity-Energy
Lorraine Barrows
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
Jill Kirkpatrick
 

Similar to RenewData Corporate Brochure (20)

Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discovery
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
Visibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructureVisibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructure
 
Epiq E Discovery Faq Hong Kong
Epiq E Discovery Faq Hong KongEpiq E Discovery Faq Hong Kong
Epiq E Discovery Faq Hong Kong
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery Perspective
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009
 
March 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinarMarch 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinar
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
 
Altlaw competitors checklist
Altlaw competitors checklistAltlaw competitors checklist
Altlaw competitors checklist
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective Archiving
 
TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data Archiving
 
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessMobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
 
Technologent-CS-Disaster_Recovery_Business_Continuity-Energy
Technologent-CS-Disaster_Recovery_Business_Continuity-EnergyTechnologent-CS-Disaster_Recovery_Business_Continuity-Energy
Technologent-CS-Disaster_Recovery_Business_Continuity-Energy
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
 

More from Alan Brooks

KMWorld - June 2015 - Why KM in the Cloud May Be Right for You
KMWorld - June 2015 - Why KM in the Cloud May Be Right for YouKMWorld - June 2015 - Why KM in the Cloud May Be Right for You
KMWorld - June 2015 - Why KM in the Cloud May Be Right for You
Alan Brooks
 
RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05
Alan Brooks
 
RenewData Managed Preservation Sevices White Paper
RenewData Managed Preservation Sevices White PaperRenewData Managed Preservation Sevices White Paper
RenewData Managed Preservation Sevices White Paper
Alan Brooks
 
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Alan Brooks
 
Executive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX ProgramExecutive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX Program
Alan Brooks
 
Business Managed Services - Speech Analytics - Datasheet (English US)
Business Managed Services - Speech Analytics - Datasheet (English US)Business Managed Services - Speech Analytics - Datasheet (English US)
Business Managed Services - Speech Analytics - Datasheet (English US)
Alan Brooks
 
Executive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX ProgramExecutive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX Program
Alan Brooks
 
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Alan Brooks
 
Creating Your Measurable PR Plan
Creating Your Measurable PR PlanCreating Your Measurable PR Plan
Creating Your Measurable PR Plan
Alan Brooks
 

More from Alan Brooks (9)

KMWorld - June 2015 - Why KM in the Cloud May Be Right for You
KMWorld - June 2015 - Why KM in the Cloud May Be Right for YouKMWorld - June 2015 - Why KM in the Cloud May Be Right for You
KMWorld - June 2015 - Why KM in the Cloud May Be Right for You
 
RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05RenewData Best Practices Workshop Summary 3-18-05
RenewData Best Practices Workshop Summary 3-18-05
 
RenewData Managed Preservation Sevices White Paper
RenewData Managed Preservation Sevices White PaperRenewData Managed Preservation Sevices White Paper
RenewData Managed Preservation Sevices White Paper
 
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
 
Executive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX ProgramExecutive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX Program
 
Business Managed Services - Speech Analytics - Datasheet (English US)
Business Managed Services - Speech Analytics - Datasheet (English US)Business Managed Services - Speech Analytics - Datasheet (English US)
Business Managed Services - Speech Analytics - Datasheet (English US)
 
Executive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX ProgramExecutive Perspectives-Implementing Closed Loop CX Program
Executive Perspectives-Implementing Closed Loop CX Program
 
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
Verint Enterprise Feedback Management (EFM) Solution Brief (English US)
 
Creating Your Measurable PR Plan
Creating Your Measurable PR PlanCreating Your Measurable PR Plan
Creating Your Measurable PR Plan
 

RenewData Corporate Brochure

  • 1. ©2007RENEWDATACORP. e D i s c o v e r y p l a n n i n g , p r e s e r v a t i o n , c o l l e c t i o n , p r o c e s s i n g , a r c h i v i n g , r e v i e w a n d p r o d u c t i o n . . . w i t h o n e s o l u t i o n p r o v i d e r , a t o n e s e c u r e f a c i l i t y .
  • 2. 1 Ta b l e o f C o n t e n t s Introduction page 1 Electronic Evidence Services page 2 Planning page 6 Preservation and Collection page 8 Processing page 14 Review page 18 Production page 18 Technology page 20 The Company page 30
  • 3. E l e c t r o n i c E v i d e n c e S e r v i c e s 3
  • 4. E l e c t r o n i c E v i d e n c e S e r v i c e s 5 RENEWDATA BENEFITS AND COST SAVINGS COMPARISON RenewData Electronic Evidence Services VS. Internal IT or other vendors Electronic collection • Spoliation exposure eliminated with preservation and preservation of evidence using documented chain-of-custody procedures Data extraction and • Fast, high-volume, cost-effective extraction and processing processing possible with RenewData technology – up to 84% less cost* Document production and • Production costs and review time are greatly reduced outside counsel review as data is de-duplicated and culled for responsive data before final production – up to 56% less cost* Subsequent discovery • Faster, cost-effective responses possible as requests ActiveVault stores already culled and de-duplicated data • Reduced time and costs spent on litigation as you have readily available knowledge of your legal situation Proliferation of electronic • Proactive development of retention and destruction data (user files and email) policies possible with ActiveVault storage throughout organization • Strategic assessment of legal liabilities possible with ActiveVault storage * Cost savings based on a hypothetical project. Your results may vary dependent on number of users, number of responsive keywords, number and type of backup tapes, amount of data on backup tapes, expected delivery time and subsequent discovery requests. • Increased exposure to spoliation issues probable • Original media environment recreation requires significantly more time and costs • Final output and review of data that is not de-duplicated or culled for responsive data is costly and time consuming • Legal situation is virtually unknown with little knowledge of what exists within user files and emails • Spoliation issues again probable • Continued use of backup tapes excludes ability to develop retention and destruction policy • Exposes organization to unknown legal liabilities In today's often litigious corporate environment, data is more than just information…its evidence. Federal rules now treat electronic documents, including email and instant messaging, the same as paper-based documents. All are viewed as discoverable. RenewData's Electronic Evidence Services provide legal professionals with an immediate response capability for audits, investigations and lawsuits. Cost Management and Methodology RenewData's proven cost-management methodology of electronic discovery allows fast and accurate responses to client’s needs while controlling costs. An extensive legal and technology background has enabled RenewData to create a methodology that is the most expedient and cost-effective in the industry. The key to the methodology is the proper architecture and predictability of the methods for extraction, collection, de- duplication, filtering and searching data for responsive email and user files. • RenewData’s use of tape header and file listings reduces the amount of collection media to a narrower subset of relevant tapes. • RenewData’s non-native environment technology avoids the additional steps necessary with more traditional data recovery methods, which can require software licensing and hardware specific to the original equipment and environment. These additional steps and requirements can significantly increase the time and cost involved, in addition to increasing exposure to risks of lost or damaged data. • RenewData’s production costs are controlled and minimized because the billing units, such as number of tapes, gigabytes of data or PST files, are highly predictable. • RenewData’s ActiveVault dynamically de-duplicates extracted data prior to the more traditional and expensive TIFF or paper generation process, reducing evidence production time and costs. • Reduction of responsive documents for outside counsel review by culling native file data with keyword search methodology and proprietary de-duplication technology. • RenewData’s ActiveVault Preservation Manager maintains files securely, using single-instance storage, thus making sub- sequent productions from the data highly efficient and less costly. And moving forward, additional data can easily be added, while preserving the integrity of the previously extracted data. • Using a unique keyword identification methodology, RenewData experts will help identify strategic options based on your specific case and how RenewData’s proprietary technology works. This highly accurate method will limit the amount of responsive or relevant data, thus saving review time and costs. RenewData’s highly scalable method effectively reduces the amount of time to extract the data, reduces the amount of data available for review through de- duplication, outputs only the content required and efficiently stores the final data, when necessary, for future litigation and discovery request needs.
  • 5. 7 PLANNING Confronted by aggressive government agencies with low tolerance and liberal civil discovery laws, many organizations are unable, at times, to adequately respond to requests because they don’t know where or how to access responsive data. In addition, when data is produced, courts are questioning whether forensically sound methods were used for preservation, extraction, and production. When an organization is faced with any litigation or investigation, RenewData provides knowledgeable guidance to respond to discovery requests cost-effectively and expediently, with either strategic or matter-specific response plans. RenewData’s solutions provide legal and corporate customers with experts who understand the related case issues and legal strategies and can effectively communicate with both technical and legal personnel. This is critical to effectively translate a case strategy to enable the delivery of the most relevant evidence. In addition to assessment and planning for production requests, RenewData’s experts provide solutions that will minimize spoliation risks, by preserving evidence under documented chain-of-custody procedures. Expert witness services of court- experienced, Daubert-challenged professionals, deliver testimony regarding the processes and tools used by RenewData. A unique combination of expertise in law, litigation strategy and technology enables RenewData to help clients obtain control of the discovery process and reduce the cost of electronic discovery. The methods and processes used have been employed in hundreds of cases for many of the nation’s largest corporations and law firms. Litigation Response Planning A litigation response plan allows you to achieve a clear understanding of your situation regarding electronic evidence and ensures your company meets its legal obligations while minimizing expenses and business disruption. RenewData’s technically knowledgeable legal experts will develop a strategy that meets your litigation response needs and detailed data gathering, collection and preservation, processing and data production requirements. RenewData works with the legal and IT teams to determine what data is required to preserve, identify the best data gathering and production techniques, decide what is technically feasible to collect, and demonstrate to all parties that your strategy is appropriate to your requirements. RenewData’s experts will then generate best practice procedures to follow upon receipt of a discovery request, preservation order or similar item. E l e c t r o n i c E v i d e n c e S e r v i c e s LITIGATION RESPONSE PLAN STEPS 1. Collect, assimilate and document client’s existing legal strategies, corporate infrastructure topography and existing evidence production processes and capabilities. 2. Work with General Counsel, Outside Counsel and IT to design a data gathering, preservation, pleading and production strategy that aligns to the legal strategy. 3. Provide client with a Litigation Response Plan containinga detailed report of findings and best-practice recommendations for procedures and technology to implement the plan. Meet and Confer RenewData legal and technical experts assist companies with their 26 (f) "meet and confer" conferences by acting as an e- discovery liaison or consultant. Some of the most common functions performed by the advisory team are: Creation of initial disclosures and advising companies regarding requests for data • Selection of production formats and review options • Design of statistical sampling protocols to lessen the burden of production • Assistance with generating documents and responses • Meet with internal staff and interview IT representatives in order to act as a third-party spokesperson for the IT department • Documentation of relevant costs for "cost shifting" analysis Expert Witness Services RenewData’s court-experienced, Daubert-challenged, legal and technical experts have provided hundreds of hours of credible testimony supporting case-specific objectives for numerous large corporations and law firms. In addition, RenewData legal experts have extensive experience as court appointed experts, acting as neutral forensic or technology experts for the court. These experts help interpret highly-technical testimony and provide accurate descriptions of computer technology and processes. Tape Reports Today’s Federal rules treat electronic documents, including email and instant messaging, the same as paper-based documents. All are viewed as discoverable, although backup tapes can be exempted as reasonably inaccessible if used for disaster recovery purposes. However, the amendments to the Federal Rules of Civil Procedure have enabled these backup tapes to be considered as discoverable, as of their adoption on December 1, 2006. RenewData can facilitate the proactive auditing process to help corporations identify data stored on backup tapes so that appropriate actions can then be taken. Tape Header Reports The Tape Header Reports provide a detailed overview of assessed media, including Media Type, Media Extraction Software, Media Creation Date, Media Expiration Date, Image Size (GB), and other statistics. (Note: information for tape header reports may differ slightly due to backup software type.) File Listing Report File Listing Reports provide a detailed overview of extracted files from assessed media that has been loaded into an ActiveVault, and include Folder Name, Extension, Size, Attributes, as well as Dates/Time Created, Modified, and Accessed. RELATIVE TESTIMONY EXAMPLES INCLUDE: • Electronic discovery results • Explanation and defense of the chain-of-custody procedures • Evidence preservation techniques used • Processing and production accuracy of data • Reconstructing computer usage based on forensic analysis of data
  • 6. PRESERVATION AND COLLECTION From the moment a discovery request or preservation order is received, the data collection and preservation methodology becomes critical to avoiding spoliation issues. RenewData’s experts use forensically sound methods to collect and preserve this crucial evidence. Data Preservation Preserving vast amounts of data and being able to effectively retrieve it without missing pieces can be very time consuming and costly. To make matters more difficult, much of the data is often duplicate user files or emails, which can mean redundant costs. Even more importantly, the inability to manage data makes organizations extremely vulnerable from a legal exposure perspective. RenewData provides legal professionals with an archive solution that enables evidence capture and preservation of enormous volumes of data across the entire enterprise. All data is stored in native file format which significantly reduces the costs of e-document conversion. RenewData then culls the native files into responsive subsets of data. Imaging and Collection At many companies, after an employee has left the company, the corporate IT team creates either a backup or forensic image of the PC or laptop used by the former employee. These images are typically created with known commercial software such as Symantec's Norton Ghost or Guidance Software's Encase. This is typically done in the eventuality that contents from the former employee's computer are required for future investigations or lawsuits. Often, these images are stored with little or no retention policy. This will result in an increasing amount of storage required over time. According to the U.S. Department of Labor, in 2005, U.S. companies experienced approximately 20% annual employee turnover, with some industries such as Finance, reaching 25%. Therefore, a company of 10,000 employees will create between 200 and 250 PC images per year. Since most PC images are about 40 gigabytes, this will result in the need for 8 to 10 terabytes of storage for each year the images are stored. These images are also not searchable or accessible. With ActiveVault Preservation Manager, companies have an alternative to the inefficient storage method used today. As a managed service, the corporate IT organization can give these images to RenewData. Once the images are received, RenewData will extract all email and user files from each image. This data is loaded into the ActiveVault Preservation Manager and the images are archived to backup tape. The result is a searchable, de-duplicated archive of former employee user data that has chain-of-custody tracking back to the original image. Tape Extraction RenewData’s Extraction Suite, based on proprietary software, enables extraction of files directly from backup tapes or other media without recreating the original native media environment. The extraction technology targets only responsive file types, eliminating the time wasted with restoring irrelevant system files. E l e c t r o n i c E v i d e n c e S e r v i c e s S u c c e s s RENEWDATA’S ACTIVEVAULT PRESERVATION MANAGER ARCHIVES CRITICAL EVIDENCE Challenge: A global financial and insurance institution under SEC investigation preservation orders, for the past year, was under subpoena to produce and deliver emails and user files going back several years. The company was backing up 22 terabytes of data every day to meet the court’s preservation orders. In addition, the company had 13 locations that all used different backup systems and environments making it even more difficult to produce and deliver the required data. Solution: The company turned to RenewData for a solution that could extract large volumes of data from multiple, complex backup environments for production. In addition, the company needed a solution for producing evidence for follow on and similar matters. RenewData quickly and cost- effectively extracted the Exchange and Lotus emails, producing backups for every six months, then archived the data for follow on matters to the investigation. The patent-pending, non-native environment extraction technology and single-instance storage in RenewData’s ActiveVault Extraction Suite enabled efficient processing of the large volumes of data and reduced the amount of data to be archived, from 350 terabytes down to 22 terabytes. Results: RenewData was able to exceed the company’s data extraction requirements with a highly scalable extraction solution and continues production for follow on matters, as well as archiving the company’s data on an ongoing basis. In addition, RenewData’s ActiveVault Preservation Manager has enabled the company to archive the company’s data for future matters and investigations, thus avoiding duplication of the extraction process and enabling the company to implement retention and destruction policies. 9
  • 7. C h a i n - o f - C u s t o d y E l e c t r o n i c E v i d e n c e S e r v i c e s This best-of-breed methodology allows reduction of the number of steps required and keeps your costs down. Data extraction can be performed from virtually any environment and media, either at your location or at RenewData’s state-of-the-art, highly secure facility. In fact, the technology enables non-native environment extraction from backup environments such as IBM Tivoli Storage Manager, LEGATO NetWorker and VERITAS NetBackup, something that other organizations in the industry have not accomplished. Forensics Evidence preservation is a crucial step in any investigation. RenewData uses the highest standards to protect and preserve the original media. Using documented procedures that address security, authenticity and chain-of-custody, RenewData investigators create a forensic image of the data that includes a digital signature or fingerprint to ensure its forensic authenticity. RenewData forensic specialists then identify the most likely source of potentially relevant data that will be used to determine computer-related activity. Knowing where to find evidence and how to manage the data through documented chain-of-custody processes is crucial in the success of any investigation. FORENSIC SERVICES INCLUDE 1. Documented and verifiable forensic imaging that preserves the integrity of evidence. 2. Data extraction and recovery capabilities to access virtually any data regardless of media, environment or physical location. 3. Highly skilled and experienced forensic experts to uncover and interpret even the smallest fragments of crucial evidence. 4. Secure chain-of-custody procedures to help ensure the admissibility of the resulting evidence. The RenewData CoC process is as follows: 1. Original media is received into the RenewData materials department in a secure receiving room. This is the location where the RenewData materials department accepts responsibility for the original media. 2. The RenewData materials department will document all pieces of original media in a standard CoC log. 3. A unique RenewData RDC ID number is created for each original media item and is cross referenced to the client’s name and the serial number, if any, on the original media. The RDC ID number is printed on a bar- code label and affixed to the original media in a manner that will not affect existing original media labels. 4. Once the CoC is complete, the original media is moved by the RenewData materials department to the Production Vault room outside of the processing center. 5. Only original media that is required for processing is removed from the Production Vault and allowed into the processing center. All access to original media is logged. 11 Chain-of-Custody is a concept in jurisprudence which applies to the handling of evidence (“CoC”). Because evidence can be used in court, it must be handled in a defined manner to minimize later allegations of tampering or misconduct which can compromise the case.
  • 8. E l e c t r o n i c E v i d e n c e S e r v i c e s S u c c e s s RENEWDATA RETRIEVES EMAIL FILES REQUIRED FOR MULTIPLE MATTERS AND ONGOING INVESTIGATIONS Challenge: Confronted with multiple urgent matters and ongoing investigations, a world leading financial organization needed to retrieve emails and user files that were archived on WORM and other backup media. The organization was having difficulty retrieving the data from the WORM archives, which would often take months to produce each time data was required. In addition, the email archiving system had not worked correctly at times, resulting in large “blackout” time periods of missing archives. Solution: RenewData was consulted to retrieve data from the organization's email archive system, as well as from the backup system for the missing blackout periods. RenewData extracted 17 terabytes of data from the email archiving system using RenewData’s ActiveVault Extraction Suite with non-native environment technology, which allows extraction of data directly from the backup media without recreating the original native hardware and software environment. The data was also de-duplicated and stored in RenewData’s ActiveVault Preservation Manager using single-instance storage, which resulted in only 6 terabytes of data versus the previous 17 terabytes. Results: RenewData’s technology enabled extraction of the organization’s email and user file archives in days versus months and allowed for a fraction of the original data to be stored using ActiveVault’s single-instance storage technology. The reduction in data also significantly reduced the cost of document production, as well as the time and costs of legal review. The organization is now able to efficiently leverage the data stored in the ActiveVault Preservation Manager to better prepare and respond to follow-on matters, as well as future investigations. RenewData’s skilled investigators are experts at acquiring and delivering this evidence from virtually any environment, email or file type including deleted, encrypted and password-protected files. RenewData’s investigators then examine and piece together the details of the evidence. With this information, RenewData provides detailed analysis and interpretation of retrieved data, and delivers comprehensive reports, based on targeted investigation objectives. Computer Investigations RenewData experts have extensive investigative experience involving computer activity and transactional investigations. RenewData investigators work with clients to develop a plan of what and whom to target, to ensure that critical data is not overlooked. Investigators can go on-site to inventory data and look for hidden sources, as well as help you prepare for depositions, discovery requests and litigation. Using RenewData’s patent-pending, proprietary technology, engineers extract the suspected user activity files and data. The non-native environment technology allows data extraction on-site or at RenewData’s facility from virtually any media or computer environment. It also enables recovery of both active and deleted data from inaccessible media and deleted files. RenewData technology also simultaneously de-duplicates and culls data, making review of the data more efficient and less costly. Utilizing years of investigative experience, RenewData forensics experts interpret and analyze the evidence gathered and provide a detailed report to support the analysis and conclusions. This evidence is produced in virtually any format or media required for the specific needs of the case including native files, printed documents, multiple electronic formats or loadable to review or storage repositories. TYPICAL STEPS OF AN INVESTIGATION 1. Client provides access to system and/or facilities for RenewData to collect evidence. 2. RenewData’s expert creates a forensic image of the original media which preserves the exact contents of the media at time of acquisition. 3. RenewData’s forensic expert consults with client to identify most likely sources of evidence. 4. User activity files and data are extracted from the media such as tapes or hard drives. 5. RenewData's forensic expert interprets and analyzes the evidence gathered and provides client with a report of findings. 6. Production of the final evidence is produced for client in required format. 7. RenewData's forensic expert provides testimony when necessary to prove proper chain-of-custody procedures, collection methodologies and scientifically-based conclusions. User activity files and data are retrieved from such sources as: • Electronic mail • Internet/Intranet files accessed • Documents and files created, accessed and deleted • Times of user creation, access or deletion • Server and gateway log files • Phone and voice records 13
  • 9. PROCESSING RenewData provides dynamic de-duplication for large volumes of information and helps ensure that unique metadata and original content are stored only once. The result is that less time is needed for processing of significantly more media and less storage space is required for the resulting data. Electronic documents are processed with complete text and metadata preserved and indexed for search accuracy. Virtually any type of media may be processed for emails and user files and the RenewData methodology minimizes the amount of data channeled into the reviewing tool and subsequent production of the data. File/Keyword/Date Filtering When filtering data, RenewData has a set of processes to not only incorporate the basic instructions provided (i.e., file types, keywords, dates), but that also consider the true intent of their clients. RenewData utilizes their industry expertise and proprietary technology in order to identify all applicable data that meets their client's objectives. File Filtering and Introspection Some solutions rely on the file extension to identify the file type. However, the file extension is not mandatory and there is no guarantee the file extension accurately reflects the content of the file. Merely relying on the stated file extension is not dependable as it is simple to modify file names and extensions. For example, a Microsoft Word document with the file name "Trade Process.doc" can be renamed to "logfile.sys". Checking only for file type by extension would not identify the actual file type and content as a Microsoft Word file. ActiveVault avoids the issues associated with using a file's extension by employing a verification process during the loading of your data called Introspection. Introspection is the ability for ActiveVault to analyze file content to determine its file type. Introspection will detect the discrepancy between the declared file-content type and the actual file-content type. Using the previous example, Introspection would detect that the content of "logfile.sys" is actually data from Microsoft Word and therefore potentially relevant and ensure this file is loaded. Without ActiveVault Introspection, it is easy to miss data when file extensions have been changed. Keyword Search The ActiveVault Search Engineers and Engagement Managers work closely with the client to understand the intent of the keywords (particularly complex) and the type of documents they are looking for. Then, they take full advantage of the search tools by deploying a search methodology that maximizes relevancy. RenewData tests and fine-tunes the results by utilizing a variety of reports and/or sampling techniques. Often, RenewData is brought in prior to and during "meet and confer" conferences to advise, sample, or run reports on the data in order for our clients to be fully armed with expert advice. E l e c t r o n i c E v i d e n c e S e r v i c e s Custom Reports The following custom reports may be used before a meet and confer or during the processing step of the e-discovery: • Extraction Reports provide a high level overview of completed extractions from assessed media and includes information regarding the extensions extracted, number of files extracted, and amount of spaced used during extraction. • Keyword Search Reports provide a detailed overview of keyword such results for completed processed files. • Date Range Reports provide a high level overview of processed message history over time for completed processed files, and include Volume ID, Month, Message Count History, and other statistics. Custodian Targeting In order to further cull down the data for relevant information, RenewData targets specific custodians. Clients provide custodian names, however locating those custodians can present a challenge as companies use a variety of naming convention variables in both their email and file listings. It is the industry expertise of RenewData that enables the analyzing and manual targeting of those custodians. RenewData works with clients to investigate and identify the appropriate custodian, or if the client prefers, RenewData may generate reports that may assist the client in their targeting: • Known Mailbox Reports provide a detailed overview of user mailbox files successfully extracted and loaded into an ActiveVault, and include Mailbox Name, PST Volume, Message Creation Dates, Message Sent Dates, and other statistics. • Known User File Reports provide a detailed overview of user files successfully extracted and loaded into ActiveVault, and include ActiveVault Category, File Extension Type, File Extension Description, Number Of Files, and Size of Files. • Unknown Mailbox Reports provide a detailed overview of user mailbox files that were either unable to be processed after extraction or successfully processed but unable to be loaded into an ActiveVault, and include Volume ID, Mount Points, Physical Media ID, Job ID, Media Creation Time, Message Mailbox File Name, Message Count, and other statistics. 15
  • 10. E l e c t r o n i c E v i d e n c e S e r v i c e s S u c c e s s RENEWDATA SAVES GLOBAL FINANCIAL INSTITUTION FROM MASSIVE FINES Challenge: Facing a federal investigation and significant potential daily fines, a global financial institution with assets of more than $334 billion needed to produce emails for certain individuals and specific dates in approximately 12 days. The company stored email files on backup tapes at each of its U.S. locations which needed to be shipped to their main headquarters for processing. The backup tapes were considered original evidence and could not leave their facility. Solution: The financial institution made the call to RenewData on Friday. RenewData investigated the client's needs and delivered a scope of work by Wednesday. The following Friday, RenewData dispatched a team to go onsite. RenewData's electronic evidence experts processed 122 backup tapes, equal to more than 854 million text pages, to extract the specific email files. RenewData's professionals went straight to the data without recreating the native environment of the original hardware and software used to create the emails. Utilizing its proprietary technology, RenewData delivered the needed emails to the financial institution on Tuesday, a day ahead of schedule. Results: The financial institution was able to deliver the email files to the federal agency in time, consequently saving their company significant daily fines. With RenewData's proprietary technology, the company also saved additional time and money as there was no need to recreate the native environment of the emails, a requirement of many competitors. Loose PSTs and NSFs also can be problematic, as roughly 90% of these files are not identified with a custodian name. In order to identify the custodian, custodian mapping must be performed. This can be extremely expensive because it is a forensic operation. However, RenewData has a proprietary tool that can automatically identify the custodian, as well as identify and eliminate invalid PSTs, saving time and money. RenewData can merge email on the Exchange Database with archived email for the same custodian and then de-duplicate against all, delivering less data for review, and ultimately, for production. Proactive Evidence Archiving The process of capturing and preserving an organizations' electronic data on an ongoing basis provides significant reductions of time and money in preparing for current or future electronic evidence productions. This capability offers the highest advantage for corporations in responding to audits, investigations and lawsuits because it provides an accessible view of electronic evidence across the entire enterprise. Using a proactive evidence preservation approach, a General Counsel, the head of corporate litigation, or a third party advisor, has the tools to assess the company’s legal exposure early in the litigation process or even before litigation begins. Advantages of this approach include: • Quick assessment of legal exposure and better preparation for subsequent discovery requests. • Control of litigation costs with the ability to plan strategies based on real knowledge of your situation. • Significantly reduced timeframes to produce initial and subsequent production requests as pre-processed and indexed native file data is available for immediate search and output. • Preparing for future investigations or matters may be as simple as searching data or adding incremental data to the existing ActiveVault. This eliminates the need to reprocess the same backup tapes multiple times for new matters or subsequent requests. Multi-Matter Evidence Archiving RenewData can also offer off-site electronic evidence preservation and record archiving for single legal matters. This non-invasive approach works from existing backup tapes and requires no software installation in an organization's environment. An ActiveVault preservation archive can be implemented in a variety of methods based upon the legal and business requirements. One or more of the following implementation methods can be used to create the ActiveVault, including the archiving of: • Matter specific email and user file data • All historical email and user file data from a set time period • All current and future email and user file data • Email and user file data for only specific target users from a set time period Advantages of this approach include: • No software to install into your IT infrastructure • No business disruption • No capital purchase • Significantly lower storage costs than if done in-house 17
  • 11. S u c c e s s 19 RENEWDATA, TRUSTED ELECTRONIC EVIDENCE ADVISOR TO A GLOBAL SEMICONDUCTOR COMPANY Challenge: In a preemptive move prior to receiving an electronic evidence production request related to a government investigation, the outside counsel firm of a global semiconductor company looked to RenewData’s experts to design a process for ensuring preservation compliance. RenewData’s consulting services were engaged to create a step-by-step process to comply with discovery requests employing computer forensic methodology — the Litigation Response Plan (“LRP”). The outside counsel believed that having such a plan prior to the discovery request would enable the semiconductor company to significantly minimize the risk of inadvertently overlooking relevant electronic documents or being accused of spoliation. Solution: When the discovery request was received, the outside counsel had a well defined process for gathering the required electronic information in a forensically sound manner. They instructed RenewData to apply its expertise in acquiring 30 hard drives and three multi-drive servers - including a server in an international location - over one weekend. RenewData used its unique culling process to de-duplicate the data, filter, and deliver for only responsive information for privilege review from the initial data collection as well as subsequent data inputs from other sources. This resulted in decreased costs and a reduction of the review period by 80%. In summary, RenewData's LRP services reduced both risk and discovery costs for the law firm's client. REVIEW RenewData provides review of the resulting data using iCONECTnxt review software or if a client prefers can export load files, TIFFs or links to native for use in other review tools. As an Application Service Provider for iCONECTnxt, RenewData enables firms to perform coding, redaction, Bates numbering, foldering and other review activities on the data. This means your data never has to leave the RenewData facility, thus ensuring an increased level of security and integrity of the data. Review is performed online using a secure web tool that enables for online review from any location. The web-based system ensures that all parties involved have equal access to the data. Additionally, the tool allows reviewers to export the Bates numbered TIFFs of their choice without requiring vendor assistance. Documents are available for review in either their native file format or in TIFF format. The native format uses a viewer that allows viewing of over 350 file types without having to install the applications or any special plug-ins. iCONECT Hosting and Review iCONECT software enables review and management of electronic and document discovery from anywhere in the world for effective collaboration with outside counsel, branch offices, and consultants. With iCONECT software, your review teams can increase productivity, save time, and lower your litigation costs by taking advantage of: • Global web-based access to case information and document discovery e-mail, native files, images, transcripts, and documents), so counsel, clients, and experts can work together on case materials and provide immediate feedback. • Secure multi-level access, so experts can view only the information they need to see while sensitive data stays locked down. • Case management tools — including a centralized case calendar, tasks list, and contacts list — that enable counsel, clients, and experts to stay in sync. Clients can log in to see what’s coming up. • Native file viewing in iCONECT’s image viewer that allows you to streamline your workflow and review over 350 native file types (including Excel, PDF, and Word) with no plug-ins or special software required, and save time with bulk-review options, review templates, and automatic foldering by review designation. PRODUCTION Production and delivery of the client’s responsive documents is a crucial step in the litigation process. RenewData’s Production Suite and expertise allow creation of tailored evidence production solutions designed to address reactive litigation or investigation matters. RenewData’s experts will help you understand the advantages of each option and then identify the best direction based on client specifications. In addition, the de-duplication of the data prior to the more expensive production process results in significantly less time and cost required for production of your responsive data. Delivery of evidence can be produced in virtually any format or media necessary to suit the needs of a case. E l e c t r o n i c E v i d e n c e S e r v i c e s DOCUMENT PRODUCTION OPTIONS • Native files • Merged PST files • TIFF files • PDF files • Printed copies of documents • Load files for litigation repositories • Custom reporting to suit the needs of your case • Download into ActiveVault storage for future needs
  • 12. Te c h n o l o g y 21
  • 13. Technology ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM Extraction Suite is designed to image media, extract files from media and load data into the Preservation Manager. In order to reduce the likelihood of damaging original media, typically backup tapes or hard drives, RenewData first makes a forensic image of the media. All extraction processing is then completed using the forensic images. For extracting data from backup tapes, RenewData has created a suite of non-native environment extraction software for IBM Tivoli, LEGATO/EMC, VERITAS, Computer Associates ARCserve, CommVault Galaxy, Hewlett- Packard and other leading manufacturers. RenewData uses dynamic de-duplication when loading data into the Preservation Manager. This process creates a digital fingerprint using a hash value upon loading, ensuring no duplicates are loaded and stored in the system. Discovery Engine is optimized for native file culling and filtering by keywords and date ranges. The Discovery Engine can rapidly and accurately index and manage virtually any native file format. Built on the Oracle database platform, the Discovery Engine offers unparalleled industry performance for searching large volumes of native files. Data can be managed by original source, custodian or data type. A complete forensic audit trail enables automatic chain-of- custody tracking back to the original source media. Production Suite provides multiple production output options of native file evidence using a flexible de- duplication methodology. Output can be de-duplicated either within a single custodian or across multiple custodians. Production options include native file output, load files with TIFF or PDF images for popular litigation repositories such as Concordance and Summation, or in paper format using local printing partners. Preservation Manager is a forensically-sound repository designed for native file data management of email messages, attachments and user files by legal professionals. Optimized for managing large volumes of files, Preservation Manager uses a single-instance storage ("SIS") model in order to store data that is a fraction of its original size. The capabilities enabling the storing of data in a forensically sound manner include: • Each email message can be traced to the originating container (i.e. Microsoft Exchange “EDB” file or loose “PST” file) and the originating source media. • A user’s email can be recreated at any point in time. • The history of each email message can be traced between multiple email server backups, showing when an email may have disappeared or was moved to a different folder. Te c h n o l o g y 23 Additionally, ActiveVault technology is optimized for: • Scalability - High speed and high volume data extraction from thousands of backup tapes per day, regardless of the backup system. • Capacity - Hundreds of terabytes of evidence can be processed in a forensically and cost-effective way for multiple production requests. • Speed - The ability to extract, index, search and output large volumes of email and user files in hours and days, rather than weeks or months. For a recurring monthly fee, RenewData provides its customers with secure archiving of their corporate information or electronic evidence in a proprietary, indexed, searchable data warehouse. This data warehouse is forensically sound, utilizes RenewData’s single instance storage technology to minimize storage requirements and can rapidly produce legal output in a variety of appropriate formats. In addition, this warehouse can be used by customers to provide review and management capabilities that enable them to access their information. ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM RenewData’s ActiveVault Evidence Management Platform ("ActiveVault") is the electronic evidence industry's leading technology platform for media and data extraction, native file filtering and production output. ActiveVault allows for the extraction of electronic information from virtually any electronic media or computer environment without recreating the native environment in which the data was stored. As the extracted data flows off of the media, ActiveVault dynamically de- duplicates the information while maintaining records about the data, such as where the duplicate files were located. This patent-pending platform is designed for rapid execution of large scale projects enabling large volumes of data to be processed in the most expeditious manner. ActiveVault is designed to ensure that legal professionals can achieve their schedules, maintain high levels of quality and control the expense of electronic evidence management. This proprietary platform is not sold or licensed as a separate product and is a key component of the ComplianceNOW, PreservationNOW and eDiscoveryNOW offerings.
  • 14. ACTIVEVAULT SINGLE-INSTANCE STORAGE (SIS) Single-instance storage (“SIS”) is a system’s ability to keep one copy of content associated with multiple custodians. For user files, ActiveVault creates a hash value, which is a digital fingerprint, for the document body and metadata of each user file. Each user file is de-duplicated upon loading into the AV Preservation Manager with forensic references to the source file path and media. In order to understand how SIS works for email, you must first understand the parts of an email message. An email message within Microsoft Exchange server is not stored as a single file. Instead, it is stored in a database with tables and fields that hold the data necessary to construct an email message. For example, when a person wants to view an email message in Microsoft Outlook, the details of the Inbox folder actually reside in a database table on the Microsoft Exchange email server. When someone wants to read a message, Microsoft Exchange takes the information from all required database tables and combines this information invisibly to the user so Outlook can then display the result as a complete email message. In the database, an email consists of the message body, location pointers and item properties stored in database tables. The location pointers and item properties comprise the metadata of a message. One table in the database, the message table, holds the message body. Another database table, the message folder table, holds all of the location pointer information ("References"). Other database tables hold the item properties (e.g. To, From, CC, BCC, Subject Line, etc.). The message body can be in multiple formats depending on the originating email client software. Therefore, a single email body may actually have multiple formats that must be stored such as HTML, ASCII Text and Rich Text format. An email with rich text may appear in Microsoft Outlook with formatting but appears as plain text in a Blackberry. The Preservation Manager stores all of these message body formats. In the case of email, like Microsoft Exchange, ActiveVault’s single-instance storage method holds one copy of the message body and attachments within the database. Duplicate references access the content through a set of database pointers and other properties, such as message senders and their recipients, which allow the content to have one-to-many references. For example, an email sent to 10 people is stored within the Preservation Manager as a single email body with 11 database record references of the message. The Preservation Manager stores other popular email formats, such as Lotus Notes, in the same method. In order to ensure the forensic accuracy of SIS and to identify duplicates, when email data is loaded into Preservation Manager, RenewData creates digital fingerprints using a hash value for both the message metadata and the message body. The SIS model typically reduces the amount of data stored in the Preservation Manager by 60 - 90%, thus reducing the cost of storage and increasing search speed. This capability is enabled by patent-pending technology and is unique to RenewData within the evidence preservation market. Te c h n o l o g y 25 Technology EXAMPLE OF SINGLE INSTANCE STORAGE “SAME EMAIL IN 3 SEPARATE LOCATIONS“ EXAMPLE OF SINGLE INSTANCE STORAGE “SAME WORD DOCUMENT IN 3 SEPARATE LOCATIONS“
  • 15. CREATING DIGITAL FINGERPRINTS WITH HASH VALUES RenewData has implemented industry standard technology to ensure the integrity of our customer’s data. RenewData uses hash values to: • Identify every message, document or file with a digital finger- print at the start of the production process • De-duplicate messages, documents and files by comparing hash values for matching values • Validate the final production output of messages, documents and files did not change during processing By using hash values during validation of the files, RenewData can ensure the documents extracted from a client's backup medium are forensically identical to the files delivered in a production to the client. What is a Hash value? “A ‘hash’ (also called a “digest”) is a kind of ‘signature’ for a stream of data that represents the contents. The closest real-life analog we can think of is ‘a tamper-evident seal on a software package’: if you open the box (change the file), it’s detected.”1 The algorithms utilized in creating a hash can detect the minutest change in the structure of the data stream. For example the MD5 and SHA-1 hash for: “The quick brown fox jumped over the lazy dog” are SHA-1 HASH: f6513640f3045e9768b239785625caa6a2588842 MD5 HASH: 08a008a01d498c404b0c30852b39d3b8 A minor change, such as changing the “d” in dog to “c” results in an entirely different hash value: “The quick brown fox jumped over the lazy cog” SHA-1 HASH: 68361d3bafa5fc245e16c9654f4ec32531535207 MD5 HASH: bd266017bcad42c85a57cc3ae5851bf8 Hash values will even change for changes in punctuation: “the quick brown fox jumped over the lazy dog” SHA-1 HASH: 6039d1003323d48347ddfdb5ce2842df758fab5f MD5 HASH: bb0fa6eff92c305f166803b6938dd33a It should be noted that hashes are “digests” of files, not the “encryption” of a file. Encryption is a two-way operation which, given the right keys, transforms data from a clear text to cipher text and back. Hashes, on the other hand, compile a stream of data into a small “digest” that is a unique representation of the data stream. Hashes are utilized in verifying file integrity, hash passwords and digital signatures. Different Hash Algorithms There are a number of hash algorithms which are utilized today to create hash values. The most popular is the MD5 hash, a 128- bit algorithm, which was originally thought to be cryptographically secure. In August, 2004 a discovery was made that a “collision” could be created using a digest created with the MD5 hash. A “collision” occurs when two different data streams generate the same hash value. “Because of the discovery of an easy method for generating collisions, many researchers recommend that replacement algorithms, such as SHA-1 or RIPEMD-160, be used instead of MD5.”2 RenewData employs the longer 160-bit SHA-1 hash algorithm to ensure the integrity of data in ActiveVault Evidence Management Platform. The SHA-1 hash is one member of a set of related cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). Te c h n o l o g y 27 Technology CREATING A HASH VALUE The creation of a hash value for a file involves the processing of a variable length message into a fixed-length output. A hash function must be able to process an arbitrary-length message into a fixed- length output. In practice, this can be achieved by breaking the input up into a series of equal-size blocks, and operating on them in sequence using a compression function. Most widely-used hash functions take the form in the diagram below. In the diagram, a message is segmented into fixed-length blocks and are compressed to an output of the same size. The combination of the compressed blocks equals the hash value for the entire message. 1 Unixwiz.net Tech Tips, “An Illustrated Guide to Cryptographic Hashes” by Steve Friedl. 2 Wikipedia the Free Encyclopedia, “MD5 (Message-Digest algorithm 5)”, http://en.wikipedia.org/wiki/MD5. 3 Federal Information Processing Standards Publication 180-1, 1995 April 17, Standard for Secure Hash Standard.
  • 16. “The SHA-1 is called secure because it is computationally infeasible to find a message which corresponds to a given message digest, or to find two different messages which produce the same message digest. Any change to a message in transit will, with very high probability, result in a different message digest, and the signature will fail to verify.”3 ACTIVEVAULT DE-DUPLICATION PROCESS De-duplication is the process of removing forensically identical copies of email messages or files from the production set. Other vendors in the industry must perform de-duplication as a separate process because they do not utilize a single-instance storage model in their systems. Because RenewData already stores de-duplicated data within ActiveVault, there is no additional de-duplication that is necessary upon output. Instead, ActiveVault sometimes must repopulate email files with messages or directories with user files in order to meet client "de-duplication" requirements. RenewData's standard production output repopulation options are: Full Repopulation (equivalent to no de-duplication) • Native Email: The email file includes all messages for the target user including duplicate messages in all locations. • Native User Files: The user directories contain all files for the target user including duplicate files in all locations. Single-Instance Repopulation Within Target User (equivalent to within custodian de-duplication) • Native Email: The email file includes one instance of each message in the folder by alphabetical sort order where it resides. Therefore, if message #1 resides in two folders, Folder A and Folder B, then one output, message #1 will be included in the email file only in Folder A. • Native User Files: The user directories contain only one instance of each file across all locations. Single-Instance Repopulation Within Folders or Directories within Target User (equivalent to within custodian de-duplication) • Native Email: The email file includes one instance of each message in any folder where it resides. Therefore, if message #1 resides in two folders, Folder A and Folder B, then one instance of message #1 will be included in the email file in each respective folder. • Native User Files: The user directories contain only one instance of each file in each respective directory. Global Single-Instance Repopulation (equivalent to global de-duplication) • Native Email: Only one instance of each message will reside across all target users. • Native User Files: Only one instance of each user file will reside across all target users. NATIVE TAPE RESTORE VS. NON-NATIVE TAPE EXTRACTION Native tape restoration is an IT process whereby all files on a backup tape are restored to a computer hard drive. The IT staff uses this process to recover a computer that has crashed. In order to perform a native tape restoration, someone needs to setup and configure a computer with the correct type of backup software. While this option seems simple, there are many complexities. For example, this process typically works for user files and simple non-threaded backup software such as Computer Associates ARCserve and Veritas Backup Exec. However, the native restore process is much more complex for threaded backup software such as Tivoli Storage Manager, LEGATO Networker, VERITAS NetBackup and for email servers. When restoring files from a threaded backup system, a database called the catalog or library is required from the original backup system. When restoring email, the email server must be set up and configured exactly as the original server. Native tape restoration typically works well for small volumes of tapes, however, the cost of computer hardware and software licensing dramatically increases the cost of restoring tapes on a large scale. For user files, all files must be restored before de- duplication can occur. This requirement makes it possible to overwrite files with the same file name but different contents and requires twice the amount of storage space for processing. Non-native tape extraction, RenewData’s method using the ActiveVault Evidence Management Platform, does not need to recreate the native environment. Instead, RenewData uses multiple pods, each pod being a computer with four (4) tape drives, to create an image of each backup tape onto a hard drive. The backup tape images are then processed to extract only the necessary files needed for restoration by using date and file extension filtering. When this occurs, all files are dynamically de- duplicated using the SHA-1 hash so only de-duplicated files are placed onto hard drives; thereby significantly reducing the amount of required storage space. Email server databases from Microsoft Exchange and Lotus Notes are then processed in the same manner, never requiring native email servers to be set up and configured. This highly efficient process is faster and less expensive than native restoration, providing significant cost savings to RenewData’s clients. Te c h n o l o g y 29 Using RenewData Technology Not Using RenewData Technology Extract data from 100 backup tapes .5 days Load extracted data for 10 target users into ActiveVault and store in de-duplicated format (data readily available from storage for follow-up requests) 2 days Keyword filtering and production (10 target users, 10 keywords) 2 days Total 4.5 days Recreate native media environment, including hardware and software purchase, setup & testing 23 days Restore 100 backup tapes to native environment and output data (data not readily available for follow-up requests) 37 days Keyword filtering and production (10 target users, 10 keywords) 4 days Total 64 days (does not include de-duplication) Time savings based on a hypothetical project. Your results may vary depending on number and type of backup tapes, amount of data, number of users and number of responsive keywords.
  • 17. T h e C o m p a n y 31
  • 18. COMPANY PROFILE RenewData Corp.® a privately held company, was formed in 2001 by combining the assets and expertise of two companies, DSTX Limited and Progressive Data Recovery. This combination brought together a group of highly accomplished legal and technology experts who recognized a growing legal need for fast retrieval of large volumes of electronic data to be used for evidence. RenewData is a leading provider of electronic evidence services and data migration for corporations and law firms that need strategic proactive and immediate reactive solutions for audits, e- discovery and investigations. RenewData's superior legal expertise features litigation response planning, forensic investigation services, electronic data extraction, litigation production services, evidence preservation archiving services and Daubert-challenged expert witness services. The uniqueness of RenewData's approach is a combination of being a strong legal services company supported by market- leading extraction and archiving technology that enables high speed, high volume processing of data directly from electronic communications systems and indirectly from legacy or complex backup or computer systems. RenewData takes great pride in providing legal and technical proficiency, as well as exceptional client relationships and meticulous attention to detail. We evaluate every client's specific needs, then provide the most cost-effective and timely solution. Our customer testimonials are proof that we have succeeded and we will continue to make client solutions our first priority. T h e C o m p a n y 33 S e c u r i t y HIGH SECURITY STATE-OF-THE-ART FACILITY RenewData’s state-of-the-art processing center is designed to ensure that critical, one-of-a-kind electronic evidence is securely and safely managed against theft, fire and loss. This type of evidence safeguarding is increasingly important for today's corporations and RenewData has addressed this need with a facility that utilizes the latest security system technology. RenewData’s processing facility features multiple layers of security and safety devices to protect the integrity of the critical data including: • Government-level physical security • Multi-zoned, role-based security access system requiring both photo ID keycards and fingerprint biometrics • Video cameras with digital recording throughout the facility to monitor movement and activity • Double-door access to the production facility. This “man trap” access requires the first door to close before the security system allows the second door to open • Interior walls composed of either concrete or steel plating • Redundant power and cooling systems • Dry chemical fire suppression system • Secure Production Vault for evidence receiving and chain-of-custody documentation • Secure vault for work-in-process storage • Secure vault within processing center for highly-sensitive evidence processing • 24x7 facility monitoring by ADT Security Services
  • 19. Corporate Headquarters 9500 Arboretum Blvd. Suite 130 Austin, TX 78759 512.276.5500 Office 888.811.3789 Toll-Free 512.276.5555 Fax E-mail: info@renewdata.com www.renewdata.com Copyright © 2007 Renew Data Corp. All rights reserved. RenewData, the sphere logo and ActiveVault are registered trademarks of Renew Data Corp. All other company and product names may be trademarks of their respective owners.