This document discusses electronic evidence services provided by RenewData Corp. It describes RenewData's benefits such as cost savings compared to handling electronic discovery internally or through other vendors. RenewData offers services for planning, preservation, collection, processing, review and production of electronic evidence from one secure facility. The document provides details on RenewData's methodology and cost management approach for electronic discovery.
This document discusses remote data backup protection for small and medium businesses. It outlines four critical components for business continuity: frequent and reliable backup, off-site backup storage, a documented restoration plan, and off-site storage of the plan. The solution, RemoteByte, automatically backs up data to a secure datacenter, reducing human errors and costs compared to tape backup. It provides 24/7 access to restored data over the internet. Contact is provided for more information on remote data backup services.
This document discusses the need to redesign backup and recovery systems to address increasing data storage needs. It outlines some of the drawbacks of traditional tape-based backup systems, such as slow speeds, high costs, and complex management. The document then introduces disk-based application protection solutions as a better alternative that can provide faster backups and restores, data deduplication to reduce storage needs, high availability and disaster recovery capabilities, and easier management through a single solution. It provides questions to consider when evaluating backup technologies and resources on AppAssure Software, a provider of disk-based backup and recovery software.
The document discusses the risks associated with big data, including increased data production leading to higher costs of replication and storage, evolving privacy and security regulations, and growing litigation and discovery obligations. It notes that most of the significant risks and costs of big data are not clearly visible and addresses challenges in areas like existing infrastructure, regulatory compliance, contracting, data retention, and eDiscovery.
Practice Tips for Successful Discovery Projectsdroselli
This document outlines Discovery Data Management in Practice. It begins with an introduction and program outline. It then discusses various stages of pre-planning including establishing the case team, scope of the project, timelines, logistics, tools, and budgets. Next, it covers topics such as data collection and preservation, data filtering, data reduction and culling, data processing, document and data review, distributed hosted review, production and reporting. It concludes with a survey of tools used by firms.
Proact’s view on archiving
Here are some guidelines we use in the design:
Reduce Cost & Complexity
As always use common sense, the more complicated a solutions the more likely it is
to have functional problems and high operating cost. We also focus on using industry
standards and standard components where it is possible. Archiving is a complex task and a
solid implementation plan combined by a step by step approach has proven successful.
Design for A Network Centric Enterprise Forensic SystemCSCJournals
Increased profitability and exposure of enterprise’s information incite more attackers to attempt exploitation on enterprise network, while striving not to leave any evidences. Although the area of digital forensic analysis is evolving to become more mature in the modern criminology, the scope of network and computer forensics in the large-scale commercial environment is still vague. The conventional forensic techniques, consisting of large proportion of manual operations and isolated processes, are not adequately compatible in modern enterprise context. Data volume of enterprise is usually overwhelming and the interference to business operation during the investigation is unwelcomed. To evidence and monitor these increasing and evolving cyber offences and criminals, forensic investigators are calling for more comprehensive forensic methodology. For comprehension of current insufficiencies, this paper starts from the probes for the weaknesses of various preliminary forensic techniques. Then it proposes an approach to design an enhanced forensic system that integrates the network distributed system concept and information fusion theory as a remedy to the drawbacks of existing forensic techniques.
The document discusses practical steps organizations can take to preserve digital information without a digital archive. It recommends preserving the bitstream by storing information on multiple media types and replacing media periodically. It also suggests preserving accessibility by monitoring software and migrating to long-term preservation formats. Finally, it stresses the importance of preserving context by classifying records and capturing metadata to demonstrate authenticity, integrity and relationships between records.
This document discusses remote data backup protection for small and medium businesses. It outlines four critical components for business continuity: frequent and reliable backup, off-site backup storage, a documented restoration plan, and off-site storage of the plan. The solution, RemoteByte, automatically backs up data to a secure datacenter, reducing human errors and costs compared to tape backup. It provides 24/7 access to restored data over the internet. Contact is provided for more information on remote data backup services.
This document discusses the need to redesign backup and recovery systems to address increasing data storage needs. It outlines some of the drawbacks of traditional tape-based backup systems, such as slow speeds, high costs, and complex management. The document then introduces disk-based application protection solutions as a better alternative that can provide faster backups and restores, data deduplication to reduce storage needs, high availability and disaster recovery capabilities, and easier management through a single solution. It provides questions to consider when evaluating backup technologies and resources on AppAssure Software, a provider of disk-based backup and recovery software.
The document discusses the risks associated with big data, including increased data production leading to higher costs of replication and storage, evolving privacy and security regulations, and growing litigation and discovery obligations. It notes that most of the significant risks and costs of big data are not clearly visible and addresses challenges in areas like existing infrastructure, regulatory compliance, contracting, data retention, and eDiscovery.
Practice Tips for Successful Discovery Projectsdroselli
This document outlines Discovery Data Management in Practice. It begins with an introduction and program outline. It then discusses various stages of pre-planning including establishing the case team, scope of the project, timelines, logistics, tools, and budgets. Next, it covers topics such as data collection and preservation, data filtering, data reduction and culling, data processing, document and data review, distributed hosted review, production and reporting. It concludes with a survey of tools used by firms.
Proact’s view on archiving
Here are some guidelines we use in the design:
Reduce Cost & Complexity
As always use common sense, the more complicated a solutions the more likely it is
to have functional problems and high operating cost. We also focus on using industry
standards and standard components where it is possible. Archiving is a complex task and a
solid implementation plan combined by a step by step approach has proven successful.
Design for A Network Centric Enterprise Forensic SystemCSCJournals
Increased profitability and exposure of enterprise’s information incite more attackers to attempt exploitation on enterprise network, while striving not to leave any evidences. Although the area of digital forensic analysis is evolving to become more mature in the modern criminology, the scope of network and computer forensics in the large-scale commercial environment is still vague. The conventional forensic techniques, consisting of large proportion of manual operations and isolated processes, are not adequately compatible in modern enterprise context. Data volume of enterprise is usually overwhelming and the interference to business operation during the investigation is unwelcomed. To evidence and monitor these increasing and evolving cyber offences and criminals, forensic investigators are calling for more comprehensive forensic methodology. For comprehension of current insufficiencies, this paper starts from the probes for the weaknesses of various preliminary forensic techniques. Then it proposes an approach to design an enhanced forensic system that integrates the network distributed system concept and information fusion theory as a remedy to the drawbacks of existing forensic techniques.
The document discusses practical steps organizations can take to preserve digital information without a digital archive. It recommends preserving the bitstream by storing information on multiple media types and replacing media periodically. It also suggests preserving accessibility by monitoring software and migrating to long-term preservation formats. Finally, it stresses the importance of preserving context by classifying records and capturing metadata to demonstrate authenticity, integrity and relationships between records.
The document discusses improving disaster recovery time through the use of deduplication storage technologies. It provides answers from Robert Amatruda of IDC to questions about current disaster recovery architectures, how technologies have evolved, the value of deduplication, and keys to a successful disaster recovery rearchitecture. The most common current architecture relies on tape backups stored offsite, which has challenges like slow restore times from tape. Technologies are evolving to use disk-based systems with inline deduplication for faster backup, replication, and recovery times to better meet SLAs. Deduplication improves disaster recovery readiness by reducing backup data volumes and enabling more efficient replication. When rearchitecting disaster recovery, organizations should consider their environment, needs,
This document discusses the challenges organizations face with litigation and electronic discovery. It notes that litigation can have widespread impact on employees, legal teams, IT, and operations. Challenges include a lack of processes for legal holds, unclear roles and responsibilities, and inability to effectively search large amounts of electronic data from various sources. The document then outlines implications like high costs of discovery without preparation. It proposes solutions such as assessing readiness, establishing a litigation response team, implementing an electronic discovery plan, classifying data, and providing training and records management.
The document discusses Go Daddy's evolution of a storage validation process to evaluate new storage technologies before deployment. It began with reactive approaches like testing in production. It moved to using freeware tools but struggled with scale and realism. Adopting SwiftTest allowed building a lab to emulate full production workloads within weeks, enabling rapid testing of technologies like SSDs, caching, and open source solutions. This process empowers Go Daddy to innovate storage and reduce costs by 65% over two years through validated solutions.
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...Dana Gardner
A Norwegian meat processing company called Fatland was hit by a ransomware attack that encrypted its systems. However, it was able to recover in just a few hours thanks to its comprehensive backup and recovery system from HPE. This included technologies like Recovery Manager Central and StoreOnce that allowed the company to restore its systems from unencrypted backup copies. Having a modern data protection architecture in place that is integrated with security helps companies avoid downtime and data loss from ransomware or other incidents. It also provides business continuity benefits beyond just security issues.
The document discusses how ITG Networks provided a turn-key solution for Tender Care Pediatric Dentistry that included upgrading their network infrastructure, implementing a new phone system, providing wireless access for patients, implementing a backup and disaster recovery plan, and ongoing managed IT services to improve office productivity and deliver a superior patient experience. The solution helped streamline business operations, boost staff efficiency, and provide peace of mind through proactive monitoring and management of the network.
An overview of the Backup and Disaster Recovery Solution By Harris Computer Services.
Prepared and Presented By: Eric Smith of Harris Computer Services
N2S is a specialist IT and telecommunications company that provides installation, management, and disposal services. It handles decommissioning, data destruction, storage, recycling, and resale of IT and telecom equipment. N2S has over 30 years of experience advising on and managing technology assets in an ethical and sustainable manner. It works with clients in various sectors to optimize assets, reduce costs and risks, and improve efficiencies.
1) While tape encryption may seem like a tactical issue, it can actually lead to strategic long-term projects for systems integrators. As regulatory pressures and data breaches increase, most large organizations will need to encrypt their backups.
2) A survey found that in 2004, only 7% of enterprises encrypted backups, but by 2006 that number grew to 25% with another 14% planning deployment in the next year. This shift was driven by highly visible data breaches, increasing privacy laws, and concerns from executive leadership.
3) Systems integrators can help organizations with tape encryption opportunities through risk assessments, backup strategy planning, and enterprise encryption implementation. These short-term projects open doors to additional strategic initiatives around
Bilcare Ltd. is a pharmaceutical company that needed to centralize its data protection across multiple locations. It implemented Symantec NetBackup with PureDisk deduplication, which reduced backup data by 91-94% through deduplication and compression. This allowed 6x faster recoveries and improved backup success rates. Storage management time was reduced by 96%.
The document discusses how big data is driving new investments in tools and services to analyze the growing volume of structured and unstructured data from sources such as sensors, social media, and e-commerce to gain insights in areas like consumer behavior, operational efficiency, and predictive healthcare. It provides examples of how Intel is using big data analytics for applications like reducing manufacturing test times and improving reseller channel management. The document also outlines Intel's vision and technologies for enabling end-to-end big data solutions from the edge to the data center to help lower the time and cost of delivering big data insights.
Curlew Research Brussels 2014 Electronic Data & Knowledge ManagementNick Lynch
Life Science externalisation and collaboration overview and the challenges that Life Science companies face in delivering successful data sharing with their partners in either Open Innovation or pre-competitive workflows
This document discusses the importance of data backups for businesses. It notes that many small businesses lack formal backup procedures or have inadequate disaster recovery plans. This puts them at risk of lost revenue and even closure if data is lost. The document provides recommendations for implementing automated and centralized backup solutions that protect important data files regularly through techniques like disk-based backups, deduplication, and cloud storage. Regular backups are crucial for businesses to avoid potential financial losses from data loss or system failures.
UpSkills: Research Data Management for the Sciencesstevage
A 2 hour introductory session presented to PhD students at the University of Melbourne, 13 September 2012.
Given by Steve Bennett (VeRSI) and Jeff Christiansen (ANDS).
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
La cannabis se refiere a las plantas Cannabis sativa e Indica. Contiene THC que causa efectos psicológicos como euforia y sedación, así como efectos fisiológicos como disminución de la fuerza muscular y aumento del apetito. Aunque algunos estudios anecdóticos sugieren usos terapéuticos como reducir la presión intraocular en el glaucoma, se necesitan más estudios controlados para determinar sus usos médicos.
The document discusses the results of a study on the effects of a new drug on memory and cognitive function in older adults. The double-blind study involved giving either the new drug or a placebo to 100 volunteers aged 65-80 over a 6 month period. Testing showed those receiving the drug experienced statistically significant improvements in short-term memory retention and processing speed compared to the placebo group.
This curriculum vita summarizes the career and qualifications of Peter Hans Santschi. It details that he is a professor of oceanography and marine sciences at Texas A&M University, that he received his PhD in chemistry from the University of Bern in Switzerland, and that he has held various academic and administrative positions throughout his career, including directorships and committee roles. The vita also provides an extensive list of Santschi's publications, research experience, industry consulting, and service to the scientific community.
The document discusses improving disaster recovery time through the use of deduplication storage technologies. It provides answers from Robert Amatruda of IDC to questions about current disaster recovery architectures, how technologies have evolved, the value of deduplication, and keys to a successful disaster recovery rearchitecture. The most common current architecture relies on tape backups stored offsite, which has challenges like slow restore times from tape. Technologies are evolving to use disk-based systems with inline deduplication for faster backup, replication, and recovery times to better meet SLAs. Deduplication improves disaster recovery readiness by reducing backup data volumes and enabling more efficient replication. When rearchitecting disaster recovery, organizations should consider their environment, needs,
This document discusses the challenges organizations face with litigation and electronic discovery. It notes that litigation can have widespread impact on employees, legal teams, IT, and operations. Challenges include a lack of processes for legal holds, unclear roles and responsibilities, and inability to effectively search large amounts of electronic data from various sources. The document then outlines implications like high costs of discovery without preparation. It proposes solutions such as assessing readiness, establishing a litigation response team, implementing an electronic discovery plan, classifying data, and providing training and records management.
The document discusses Go Daddy's evolution of a storage validation process to evaluate new storage technologies before deployment. It began with reactive approaches like testing in production. It moved to using freeware tools but struggled with scale and realism. Adopting SwiftTest allowed building a lab to emulate full production workloads within weeks, enabling rapid testing of technologies like SSDs, caching, and open source solutions. This process empowers Go Daddy to innovate storage and reduce costs by 65% over two years through validated solutions.
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...Dana Gardner
A Norwegian meat processing company called Fatland was hit by a ransomware attack that encrypted its systems. However, it was able to recover in just a few hours thanks to its comprehensive backup and recovery system from HPE. This included technologies like Recovery Manager Central and StoreOnce that allowed the company to restore its systems from unencrypted backup copies. Having a modern data protection architecture in place that is integrated with security helps companies avoid downtime and data loss from ransomware or other incidents. It also provides business continuity benefits beyond just security issues.
The document discusses how ITG Networks provided a turn-key solution for Tender Care Pediatric Dentistry that included upgrading their network infrastructure, implementing a new phone system, providing wireless access for patients, implementing a backup and disaster recovery plan, and ongoing managed IT services to improve office productivity and deliver a superior patient experience. The solution helped streamline business operations, boost staff efficiency, and provide peace of mind through proactive monitoring and management of the network.
An overview of the Backup and Disaster Recovery Solution By Harris Computer Services.
Prepared and Presented By: Eric Smith of Harris Computer Services
N2S is a specialist IT and telecommunications company that provides installation, management, and disposal services. It handles decommissioning, data destruction, storage, recycling, and resale of IT and telecom equipment. N2S has over 30 years of experience advising on and managing technology assets in an ethical and sustainable manner. It works with clients in various sectors to optimize assets, reduce costs and risks, and improve efficiencies.
1) While tape encryption may seem like a tactical issue, it can actually lead to strategic long-term projects for systems integrators. As regulatory pressures and data breaches increase, most large organizations will need to encrypt their backups.
2) A survey found that in 2004, only 7% of enterprises encrypted backups, but by 2006 that number grew to 25% with another 14% planning deployment in the next year. This shift was driven by highly visible data breaches, increasing privacy laws, and concerns from executive leadership.
3) Systems integrators can help organizations with tape encryption opportunities through risk assessments, backup strategy planning, and enterprise encryption implementation. These short-term projects open doors to additional strategic initiatives around
Bilcare Ltd. is a pharmaceutical company that needed to centralize its data protection across multiple locations. It implemented Symantec NetBackup with PureDisk deduplication, which reduced backup data by 91-94% through deduplication and compression. This allowed 6x faster recoveries and improved backup success rates. Storage management time was reduced by 96%.
The document discusses how big data is driving new investments in tools and services to analyze the growing volume of structured and unstructured data from sources such as sensors, social media, and e-commerce to gain insights in areas like consumer behavior, operational efficiency, and predictive healthcare. It provides examples of how Intel is using big data analytics for applications like reducing manufacturing test times and improving reseller channel management. The document also outlines Intel's vision and technologies for enabling end-to-end big data solutions from the edge to the data center to help lower the time and cost of delivering big data insights.
Curlew Research Brussels 2014 Electronic Data & Knowledge ManagementNick Lynch
Life Science externalisation and collaboration overview and the challenges that Life Science companies face in delivering successful data sharing with their partners in either Open Innovation or pre-competitive workflows
This document discusses the importance of data backups for businesses. It notes that many small businesses lack formal backup procedures or have inadequate disaster recovery plans. This puts them at risk of lost revenue and even closure if data is lost. The document provides recommendations for implementing automated and centralized backup solutions that protect important data files regularly through techniques like disk-based backups, deduplication, and cloud storage. Regular backups are crucial for businesses to avoid potential financial losses from data loss or system failures.
UpSkills: Research Data Management for the Sciencesstevage
A 2 hour introductory session presented to PhD students at the University of Melbourne, 13 September 2012.
Given by Steve Bennett (VeRSI) and Jeff Christiansen (ANDS).
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
La cannabis se refiere a las plantas Cannabis sativa e Indica. Contiene THC que causa efectos psicológicos como euforia y sedación, así como efectos fisiológicos como disminución de la fuerza muscular y aumento del apetito. Aunque algunos estudios anecdóticos sugieren usos terapéuticos como reducir la presión intraocular en el glaucoma, se necesitan más estudios controlados para determinar sus usos médicos.
The document discusses the results of a study on the effects of a new drug on memory and cognitive function in older adults. The double-blind study involved giving either the new drug or a placebo to 100 volunteers aged 65-80 over a 6 month period. Testing showed those receiving the drug experienced statistically significant improvements in short-term memory retention and processing speed compared to the placebo group.
This curriculum vita summarizes the career and qualifications of Peter Hans Santschi. It details that he is a professor of oceanography and marine sciences at Texas A&M University, that he received his PhD in chemistry from the University of Bern in Switzerland, and that he has held various academic and administrative positions throughout his career, including directorships and committee roles. The vita also provides an extensive list of Santschi's publications, research experience, industry consulting, and service to the scientific community.
Tunnel boring machines (TBMs) are used to excavate tunnels with a circular cross-section through various ground conditions ranging from soft ground to hard rock. TBMs can bore tunnels continuously with minimal ground disturbance compared to traditional drilling and blasting methods. Modern TBMs function as a single, self-contained unit that can drill, excavate soil and rock, apply concrete segmental lining, and remove spoils, making them highly efficient for tunneling projects.
SNL plummer block housings from SKF provide several benefits:
1. They offer easy installation as preassembled shafts can be mounted in the split housings.
2. They are designed with one basic design that accommodates many variants through a "building block" system of interchangeable seals and bearing options.
3. They provide superior performance through features like a stiff design, excellent heat dissipation, and multiple sealing options - extending the service life of components.
Why Qatar Needs a New Technical Vocational Education and Training Strategy NowWesley Schwalje
Beginning in the late Nineties, Qatar launched a comprehensive set of education reforms to more effectively align its education and training system with its macroeconomic policies aimed at advancing towards a knowledge-based economy. However, technical vocational education and training (TVET) has not been a significant focus of educational reforms.
Capture Discovery is a leading e-discovery services provider that helps clients control costs and find relevant data through their experience, expertise, and technology. They offer a full range of services including data collection, early data assessment to reduce volume, document processing, review platform hosting, and production. Clients report that working with Capture Discovery provides a refreshing change from other vendors due to their customer service and cost-effective solutions.
Visibility and insight - Understand what is going on with your IT infrastructureMarie Wilcox
This document discusses Tectrade, a company that provides data protection and visibility services. It summarizes Tectrade's mission to protect customer data using industry-leading technologies. It then outlines challenges modern IT departments face around visibility, cost, risk and policy compliance. The rest of the document describes Tectrade's services, which include developing policies, implementing technology, enhancing operations, and providing advisory, discovery, support and management services to help customers understand their data, optimize resources, and monitor their environments.
E-discovery is the application of technology to the document review and discovery processes in litigation and regulatory matters. It can significantly reduce the time and costs associated with document review by using techniques like keyword searching, de-duplication, and prioritizing relevant documents. While some lawyers may not be tech savvy, e-discovery services ensure the process is straightforward and secure, protecting clients' privileged information. E-discovery becomes more important as the volume of electronic data grows, and can benefit even smaller matters through increased efficiency.
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
Information governance, records and information management, and data disposition policies are ways to help lower costs and mitigate risks for organizations. Policies and procedures to actively manage data are not just an IT "problem," they're a collaborative business initiative that is a must in today's "big data" environment. With electronic discovery rules, government regulations and the Sarbanes-Oxley Act, all organizations must proactively take steps to manage their data with well-governed processes and controls, or be willing to face the risks and costs that come along with keeping everything. Organizations must know what information they have, where it is located, the duration data must be retained and what information would be needed when responding to an event.
There have been numerous instances of severe legal penalties for organizations that did not have an electronic data strategy, tools, processes and controls to locate and understand their own data. In addition, the risks of unmanaged data include skyrocketing infrastructure and personnel costs and an increase in attorney time to manage massive amounts of data when a litigation event occurs.
Information governance is needed much like any business continuity and disaster recovery plans, but with an understanding of data: where data are located, how data are managed, event response, and regular testing of processes and procedures for preparedness.
This document provides an overview of electronic discovery (eDiscovery) including key drivers and challenges. It discusses how digital information is growing exponentially and the rising pressure on corporations to have comprehensive eDiscovery strategies to address litigation needs. The eDiscovery process is described including collections, processing, review and planning. Challenges like tight deadlines, legal expertise needs, and technology expertise are covered. The importance of people, process and technology is emphasized.
This document provides strategies and solutions for corporate counsel to reduce law department costs and increase efficiency. It discusses challenges such as increased litigation volume and regulatory changes putting pressure on budgets. It then offers four key strategies - moving more work in-house utilizing technology, implementing alternative fee arrangements, and increasing the use of support personnel. For each strategy, it highlights why it can help reduce costs and overcome potential hurdles, and provides examples of how LexisNexis solutions such as CaseMap and Concordance can support the strategy.
March 2014 aceds portfolio c&g kroll webinarDavid Kearney
The document discusses the benefits of adopting a portfolio management approach to e-discovery projects over the traditional case-by-case approach. It notes that while each case may be unique, there is significant overlap between cases in terms of documents, custodians, and tools used. A portfolio approach acknowledges this overlap and allows organizations to minimize redundant work, avoid duplicate data collection, and reduce total data storage needs. It emphasizes establishing consistent, repeatable processes and leveraging the same technologies across all projects to cut costs and work more efficiently. The document also provides considerations for implementing a portfolio solution and ensuring any tools adopted are secure, cost-effective and able to meet both current and future needs.
Document Technologies Inc. is the largest independent provider of litigation support services, assisting clients throughout the legal process. They have over 1,500 employees across 20 offices and offer end-to-end solutions including data collection, processing, review and production. Their Washington D.C. office provides local document review facilities, scanning, and computer forensics services.
Document Technologies Inc. is the largest independent provider of litigation support services, assisting clients throughout the legal process. They have a national presence with over 1,500 employees across 20 markets. As an end-to-end provider, they offer services including data preservation, review, processing and production. They utilize best-of-breed technologies and have facilities in DC and Atlanta capable of large-scale electronic discovery.
The document discusses best practices for meeting critical challenges in eDiscovery. It addresses the need for a systematized eDiscovery program to deal with disparate systems, massive data volumes, and new technologies. Technology assisted discovery is increasingly important and can yield cost savings over manual review. An effective eDiscovery process requires early case assessment, legal holds, review and analysis, and processing and production, supported by information governance practices around archiving email and records. Advanced technologies can help classify records without human intervention and improve eDiscovery processes by examining information in context.
Considerations When Building e-Discovery David Kearney
This document discusses considerations for law firms when designing in-house or outsourced e-discovery processes, workflows, and technology solutions. It notes that with increasing data volumes, technology changes, personnel costs, and client budgets/knowledge, all but the largest firms need to seriously consider outsourcing some functions or using a hybrid model. When deciding, firms must consider organizational culture, maturity, risk tolerance, infrastructure, costs, training needs, service levels, collections, applications, personnel requirements, workflows, and protecting the organization. There is no one-size-fits-all approach, and options need evaluating based on each firm's unique needs and priorities.
This document discusses best practices for managing relationships within the "triangle" of law firms, clients, and service providers in e-discovery. It provides tips for establishing clear expectations, transparent processes, effective communication structures, and accountability to reduce costs, ensure data privacy and protection of privileged information, and increase efficiency throughout the e-discovery process. The presenters share examples and lessons learned from case studies to illustrate keys to success like trust, competence, group buy-in, and evolving practices in response to data.
The document discusses best practices for streamlining document review and production in litigation. It emphasizes the importance of information governance and establishing protocols for data mapping, retention policies, and litigation holds. Effective preservation and identification of data sources is key. The use of technology like analytics and technology-assisted review can help reduce the cost and burden of document review, the most expensive part of the discovery process. Engaging with vendors and counsel about the latest tools is important for minimizing expenses throughout the litigation process.
This document discusses 4 essential eDiscovery features that legal teams should consider to gain a competitive advantage: 1) TAR 2.0 technology that can automate document review through machine learning, 2) Secure cloud-based collaboration tools to allow remote work, 3) Language identification and translation capabilities to efficiently process foreign language documents, and 4) Holistic technical support throughout the eDiscovery process to reduce delays and free up internal resources. Adopting these features can help legal teams work more accurately, efficiently and securely.
Seven Essential Strategies for Effective ArchivingEMC
Archiving helps organizations effectively retain, manage, and leverage their information assets. It is also complimentary to backup and broader data protection activities. This paper outlines seven essential strategies for archiving that drive cost savings, risk reduction and IT transformation.
TDWI Checklist Report: Active Data ArchivingRainStor
The document discusses best practices for active data archiving. It recommends embracing modern archiving platforms and practices to address problems with traditional archives. A modern archive should serve compliance needs through immutable, auditable data storage, while also enabling analytics through online access. It should scale to large volumes of structured and unstructured data from various sources and support roles-based security and multi-tenancy. The archive's primary tier should be a robust database for online querying and exploration of archived data.
Mobile & Cloud Technology - Doing more with lessSasha Levage
This document discusses mobile and cloud technology for backflow testing. Mobile allows information to be accessible anywhere and cloud computing provides specialized systems without needing dedicated staff. Making the switch can be difficult but provides benefits like lower costs, increased security and constant improvements. Key questions to ask include how a mobile or cloud solution would benefit the business, any costs for new devices or customization, data ownership and security, and support response times. Adopting these technologies requires training and ensuring compliance with regulations for backflow testing and record keeping.
An oil and gas company wanted to establish an effective disaster recovery (DR) plan to protect its data and ensure business continuity. Technologent helped by designing a secondary DR site and developing the necessary documentation and processes. This included inventorying the company's IT assets, architecting the DR infrastructure, identifying critical applications, writing runbooks outlining failover procedures, and conducting tests of the DR plan. Technologent also trained the company's staff to enable them to independently execute and maintain the DR program. The end result was a comprehensive DR solution that assured business continuity in the event of a disaster.
The Data-Driven Transformation of the Distribution UtilityJill Kirkpatrick
This document discusses the traditional utility approach to software development and where utilities are moving in their digital transformations. Traditionally, utilities took a long-term, customized approach to software adoption. However, new internet-connected devices are outpacing legacy systems. To transform, utilities need a digital team to prioritize use cases, evaluate build vs buy options, develop a flexible data architecture, create minimum viable products, and integrate digital efforts into business units. Barriers include regulatory challenges, short-term thinking, funding, and cultural issues. Success requires hiring digital talent as well as training existing staff.
KMWorld - June 2015 - Why KM in the Cloud May Be Right for YouAlan Brooks
Deploying knowledge management (KM) in the cloud may have several benefits for organizations. It can help remove silos by allowing easy knowledge sharing across departments no matter location or device. Cloud KM also simplifies integration with other cloud systems and enables knowledge networks between organizations. Some financial benefits include faster time to value since access to cloud systems begins at implementation, reduced infrastructure costs since the provider handles maintenance and upgrades, and responsive capacity for seasonal volume changes. Cloud KM also provides access to experts who can help organizations maximize the cloud system's capabilities.
RenewData Best Practices Workshop Summary 3-18-05Alan Brooks
The document summarizes a workshop on electronic discovery best practices hosted by RenewData. Key challenges discussed included high costs, lack of education, inconsistent vendor standards, and difficulties managing preservation and review processes. Attendees shared approaches to issues like setting retention policies, selecting preferred vendors, and using tools for remote access and duplicate detection. Future workshops could focus on developing a best practices list and hands-on case discussions. RenewData sponsored the event and provides eDiscovery services including data processing and expert witness support.
RenewData Managed Preservation Sevices White PaperAlan Brooks
This document discusses the challenges of electronic discovery and legal preservation requirements for large corporations. It notes that most corporations have terabytes of backup data stored on tapes that is difficult and costly to search when legal requests come in. The solution proposed is an ActiveVault managed preservation archiving service. This service extracts data from backup tapes, deduplicates it, and stores it in a searchable archive. It aims to help corporations better understand legal risks, reduce eDiscovery costs, and ensure all relevant data is preserved if needed for future matters.
The Verint Enterprise Feedback Management solution provides capabilities for centralized collection and analysis of multichannel customer and employee feedback. It allows organizations to design intuitive surveys, segment customer profiles, integrate feedback with agent performance metrics, and generate interactive dashboards and reports. The solution is designed for enterprise-wide use with options for multi-department access control, third party integration, scalability, and cloud or on-premise deployment.
Implementing a closed-loop customer experience program can significantly improve customer satisfaction scores by creating alerts for negative feedback and having employees address customer issues. This improves the customer experience while also providing insights into process improvements. Key aspects of a successful program include setting objectives and metrics, implementing core feedback and resolution processes, gaining employee buy-in, and using a customer feedback and case management system to track issues.
Verint Business Managed Services can help companies maximize the benefits of their Verint Speech Analytics solution through program management, ongoing business insights reporting, and operational management. This allows companies to focus on their business while Verint experts adapt the analytics solution to changing needs and ensure goals are met for increasing revenue, decreasing costs, and enhancing customer loyalty.
Implementing a closed-loop customer experience program can significantly improve customer satisfaction scores by creating alerts for negative feedback and having employees address customer issues. This closes the loop with customers and helps identify trends to improve processes. Key aspects of a successful program include determining objectives and metrics, implementing core closed-loop processes like capturing feedback and resolving issues, and gaining employee buy-in through communication and acknowledgement of contributions. An integrated feedback and case management system can help organizations centrally manage feedback alerts, cases and resolutions across departments.
The Verint Enterprise Feedback Management solution provides capabilities for centralized collection and analysis of multichannel customer and employee feedback. It allows organizations to design intuitive surveys, segment customer profiles, link feedback to agent performance, and close the loop on customer issues. The solution offers interactive dashboards, role-based reporting, and cross-survey analysis to gain insights from feedback. It is designed for enterprise-wide use with support for multiple departments, integration, scalability, and deployment options.
The document discusses creating a measurable public relations plan with four key steps:
1) Define specific, measurable objectives that are aligned with business goals and target audiences and have defined timeframes.
2) Align marketing strategies and communication tactics to target audiences' preferences.
3) Evaluate communication tactics based on their return on investment.
4) Summarize the plan and measurements and review them monthly, quarterly, and annually.
2. 1
Ta b l e o f C o n t e n t s
Introduction page 1
Electronic Evidence Services page 2
Planning page 6
Preservation and Collection page 8
Processing page 14
Review page 18
Production page 18
Technology page 20
The Company page 30
3. E l e c t r o n i c
E v i d e n c e S e r v i c e s
3
4. E l e c t r o n i c E v i d e n c e S e r v i c e s
5
RENEWDATA BENEFITS AND COST SAVINGS COMPARISON
RenewData Electronic Evidence Services VS. Internal IT or other vendors
Electronic collection • Spoliation exposure eliminated with preservation
and preservation of evidence using documented chain-of-custody
procedures
Data extraction and • Fast, high-volume, cost-effective extraction and
processing processing possible with RenewData technology –
up to 84% less cost*
Document production and • Production costs and review time are greatly reduced
outside counsel review as data is de-duplicated and culled for responsive
data before final production – up to 56% less cost*
Subsequent discovery • Faster, cost-effective responses possible as
requests ActiveVault stores already culled and de-duplicated
data
• Reduced time and costs spent on litigation as you have
readily available knowledge of your legal situation
Proliferation of electronic • Proactive development of retention and destruction
data (user files and email) policies possible with ActiveVault storage
throughout organization
• Strategic assessment of legal liabilities possible
with ActiveVault storage
* Cost savings based on a hypothetical project. Your results may vary dependent on number of users, number of responsive keywords, number and type of backup tapes, amount
of data on backup tapes, expected delivery time and subsequent discovery requests.
• Increased exposure to spoliation issues
probable
• Original media environment recreation
requires significantly more time and costs
• Final output and review of data that is not
de-duplicated or culled for responsive data is
costly and time consuming
• Legal situation is virtually unknown with little
knowledge of what exists within user files
and emails
• Spoliation issues again probable
• Continued use of backup tapes excludes ability
to develop retention and destruction policy
• Exposes organization to unknown legal
liabilities
In today's often litigious corporate environment, data is more
than just information…its evidence. Federal rules now treat
electronic documents, including email and instant messaging,
the same as paper-based documents. All are viewed as
discoverable. RenewData's Electronic Evidence Services provide
legal professionals with an immediate response capability for
audits, investigations and lawsuits.
Cost Management and Methodology
RenewData's proven cost-management methodology of
electronic discovery allows fast and accurate responses to
client’s needs while controlling costs. An extensive legal and
technology background has enabled RenewData to create a
methodology that is the most expedient and cost-effective in
the industry.
The key to the methodology is the proper architecture and
predictability of the methods for extraction, collection, de-
duplication, filtering and searching data for responsive email
and user files.
• RenewData’s use of tape header and file listings reduces the
amount of collection media to a narrower subset of relevant
tapes.
• RenewData’s non-native environment technology avoids the
additional steps necessary with more traditional data recovery
methods, which can require software licensing and hardware
specific to the original equipment and environment. These
additional steps and requirements can significantly increase
the time and cost involved, in addition to increasing exposure
to risks of lost or damaged data.
• RenewData’s production costs are controlled and minimized
because the billing units, such as number of tapes, gigabytes
of data or PST files, are highly predictable.
• RenewData’s ActiveVault dynamically de-duplicates extracted
data prior to the more traditional and expensive TIFF or paper
generation process, reducing evidence production time
and costs.
• Reduction of responsive documents for outside counsel review
by culling native file data with keyword search methodology
and proprietary de-duplication technology.
• RenewData’s ActiveVault Preservation Manager maintains
files securely, using single-instance storage, thus making sub-
sequent productions from the data highly efficient and less
costly. And moving forward, additional data can easily be
added, while preserving the integrity of the previously
extracted data.
• Using a unique keyword identification methodology,
RenewData experts will help identify strategic options based
on your specific case and how RenewData’s proprietary
technology works. This highly accurate method will limit the
amount of responsive or relevant data, thus saving review
time and costs. RenewData’s highly scalable method
effectively reduces the amount of time to extract the data,
reduces the amount of data available for review through de-
duplication, outputs only the content required and efficiently
stores the final data, when necessary, for future litigation and
discovery request needs.
5. 7
PLANNING
Confronted by aggressive government agencies with low
tolerance and liberal civil discovery laws, many organizations are
unable, at times, to adequately respond to requests because
they don’t know where or how to access responsive data. In
addition, when data is produced, courts are questioning whether
forensically sound methods were used for preservation,
extraction, and production.
When an organization is faced with any litigation or
investigation, RenewData provides knowledgeable guidance to
respond to discovery requests cost-effectively and expediently,
with either strategic or matter-specific response plans.
RenewData’s solutions provide legal and corporate customers
with experts who understand the related case issues and legal
strategies and can effectively communicate with both technical
and legal personnel. This is critical to effectively translate a case
strategy to enable the delivery of the most relevant evidence.
In addition to assessment and planning for production requests,
RenewData’s experts provide solutions that will minimize
spoliation risks, by preserving evidence under documented
chain-of-custody procedures. Expert witness services of court-
experienced, Daubert-challenged professionals, deliver
testimony regarding the processes and tools used by
RenewData.
A unique combination of expertise in law, litigation strategy and
technology enables RenewData to help clients obtain control of
the discovery process and reduce the cost of electronic
discovery.
The methods and processes used have been employed in
hundreds of cases for many of the nation’s largest corporations
and law firms.
Litigation Response Planning
A litigation response plan allows you to achieve a clear
understanding of your situation regarding electronic evidence
and ensures your company meets its legal obligations while
minimizing expenses and business disruption.
RenewData’s technically knowledgeable legal experts will
develop a strategy that meets your litigation response needs
and detailed data gathering, collection and preservation,
processing and data production requirements.
RenewData works with the legal and IT teams to determine
what data is required to preserve, identify the best data
gathering and production techniques, decide what is
technically feasible to collect, and demonstrate to all parties
that your strategy is appropriate to your requirements.
RenewData’s experts will then generate best practice
procedures to follow upon receipt of a discovery request,
preservation order or similar item.
E l e c t r o n i c E v i d e n c e S e r v i c e s
LITIGATION RESPONSE PLAN STEPS
1. Collect, assimilate and document client’s existing legal
strategies, corporate infrastructure topography and
existing evidence production processes and capabilities.
2. Work with General Counsel, Outside Counsel and IT to
design a data gathering, preservation, pleading and
production strategy that aligns to the legal strategy.
3. Provide client with a Litigation Response Plan
containinga detailed report of findings and best-practice
recommendations for procedures and technology to
implement the plan.
Meet and Confer
RenewData legal and technical experts assist companies with
their 26 (f) "meet and confer" conferences by acting as an e-
discovery liaison or consultant. Some of the most common
functions performed by the advisory team are:
Creation of initial disclosures and advising companies
regarding requests for data
• Selection of production formats and review options
• Design of statistical sampling protocols to lessen the burden
of production
• Assistance with generating documents and responses
• Meet with internal staff and interview IT representatives in
order to act as a third-party spokesperson for the IT
department
• Documentation of relevant costs for "cost shifting" analysis
Expert Witness Services
RenewData’s court-experienced, Daubert-challenged, legal and
technical experts have provided hundreds of hours of credible
testimony supporting case-specific objectives for numerous
large corporations and law firms.
In addition, RenewData legal experts have extensive
experience as court appointed experts, acting as neutral
forensic or technology experts for the court. These experts help
interpret highly-technical testimony and provide accurate
descriptions of computer technology and processes.
Tape Reports
Today’s Federal rules treat electronic documents, including
email and instant messaging, the same as paper-based
documents. All are viewed as discoverable, although backup
tapes can be exempted as reasonably inaccessible if used for
disaster recovery purposes. However, the amendments to the
Federal Rules of Civil Procedure have enabled these backup
tapes to be considered as discoverable, as of their adoption on
December 1, 2006.
RenewData can facilitate the proactive auditing process to
help corporations identify data stored on backup tapes so that
appropriate actions can then be taken.
Tape Header Reports
The Tape Header Reports provide a detailed overview
of assessed media, including Media Type, Media
Extraction Software, Media Creation Date, Media
Expiration Date, Image Size (GB), and other statistics.
(Note: information for tape header reports may differ
slightly due to backup software type.)
File Listing Report
File Listing Reports provide a detailed overview of
extracted files from assessed media that has been
loaded into an ActiveVault, and include Folder Name,
Extension, Size, Attributes, as well as Dates/Time
Created, Modified, and Accessed.
RELATIVE TESTIMONY EXAMPLES INCLUDE:
• Electronic discovery results
• Explanation and defense of the chain-of-custody
procedures
• Evidence preservation techniques used
• Processing and production accuracy of data
• Reconstructing computer usage based on forensic
analysis of data
6. PRESERVATION AND COLLECTION
From the moment a discovery request or preservation order is
received, the data collection and preservation methodology
becomes critical to avoiding spoliation issues. RenewData’s
experts use forensically sound methods to collect and preserve
this crucial evidence.
Data Preservation
Preserving vast amounts of data and being able to effectively
retrieve it without missing pieces can be very time consuming
and costly. To make matters more difficult, much of the data is
often duplicate user files or emails, which can mean redundant
costs. Even more importantly, the inability to manage data makes
organizations extremely vulnerable from a legal exposure
perspective.
RenewData provides legal professionals with an archive solution
that enables evidence capture and preservation of enormous
volumes of data across the entire enterprise.
All data is stored in native file format which significantly reduces
the costs of e-document conversion. RenewData then culls the
native files into responsive subsets of data.
Imaging and Collection
At many companies, after an employee has left the company, the
corporate IT team creates either a backup or forensic image of the
PC or laptop used by the former employee. These images are
typically created with known commercial software such as
Symantec's Norton Ghost or Guidance Software's Encase. This is
typically done in the eventuality that contents from the former
employee's computer are required for future investigations or
lawsuits. Often, these images are stored with little or no
retention policy. This will result in an increasing amount of
storage required over time.
According to the U.S. Department of Labor, in 2005, U.S.
companies experienced approximately 20% annual employee
turnover, with some industries such as Finance, reaching 25%.
Therefore, a company of 10,000 employees will create between
200 and 250 PC images per year. Since most PC images are about
40 gigabytes, this will result in the need for 8 to 10 terabytes of
storage for each year the images are stored. These images are
also not searchable or accessible.
With ActiveVault Preservation Manager, companies have an
alternative to the inefficient storage method used today. As a
managed service, the corporate IT organization can give these
images to RenewData. Once the images are received,
RenewData will extract all email and user files from each image.
This data is loaded into the ActiveVault Preservation Manager
and the images are archived to backup tape. The result is a
searchable, de-duplicated archive of former employee user data
that has chain-of-custody tracking back to the original image.
Tape Extraction
RenewData’s Extraction Suite, based on proprietary software,
enables extraction of files directly from backup tapes or other
media without recreating the original native media environment.
The extraction technology targets only responsive file types,
eliminating the time wasted with restoring irrelevant system files.
E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA’S ACTIVEVAULT PRESERVATION MANAGER ARCHIVES CRITICAL EVIDENCE
Challenge: A global financial and insurance institution under SEC investigation preservation orders,
for the past year, was under subpoena to produce and deliver emails and user files going back several
years. The company was backing up 22 terabytes of data every day to meet the court’s preservation
orders. In addition, the company had 13 locations that all used different backup systems and
environments making it even more difficult to produce and deliver the required data.
Solution: The company turned to RenewData for a solution that could extract large volumes of data
from multiple, complex backup environments for production. In addition, the company needed a
solution for producing evidence for follow on and similar matters. RenewData quickly and cost-
effectively extracted the Exchange and Lotus emails, producing backups for every six months, then
archived the data for follow on matters to the investigation. The patent-pending, non-native
environment extraction technology and single-instance storage in RenewData’s ActiveVault
Extraction Suite enabled efficient processing of the large volumes of data and reduced the amount of
data to be archived, from 350 terabytes down to 22 terabytes.
Results: RenewData was able to exceed the company’s data extraction requirements with a highly
scalable extraction solution and continues production for follow on matters, as well as archiving the
company’s data on an ongoing basis. In addition, RenewData’s ActiveVault Preservation Manager has
enabled the company to archive the company’s data for future matters and investigations, thus
avoiding duplication of the extraction process and enabling the company to implement retention and
destruction policies.
9
7. C h a i n - o f -
C u s t o d y
E l e c t r o n i c E v i d e n c e S e r v i c e s
This best-of-breed methodology allows reduction of the number
of steps required and keeps your costs down. Data extraction can
be performed from virtually any environment and media, either at
your location or at RenewData’s state-of-the-art, highly secure
facility. In fact, the technology enables non-native environment
extraction from backup environments such as IBM Tivoli Storage
Manager, LEGATO NetWorker and VERITAS NetBackup,
something that other organizations in the industry have not
accomplished.
Forensics
Evidence preservation is a crucial step in any investigation.
RenewData uses the highest standards to protect and preserve
the original media. Using documented procedures that address
security, authenticity and chain-of-custody, RenewData
investigators create a forensic image of the data that includes a
digital signature or fingerprint to ensure its forensic authenticity.
RenewData forensic specialists then identify the most likely
source of potentially relevant data that will be used to determine
computer-related activity. Knowing where to find evidence and
how to manage the data through documented chain-of-custody
processes is crucial in the success of any investigation.
FORENSIC SERVICES INCLUDE
1. Documented and verifiable forensic imaging that
preserves the integrity of evidence.
2. Data extraction and recovery capabilities to access
virtually any data regardless of media, environment or
physical location.
3. Highly skilled and experienced forensic experts to
uncover and interpret even the smallest fragments of
crucial evidence.
4. Secure chain-of-custody procedures to help ensure the
admissibility of the resulting evidence.
The RenewData CoC process is as follows:
1. Original media is received into the RenewData
materials department in a secure receiving room. This
is the location where the RenewData materials
department accepts responsibility for the original
media.
2. The RenewData materials department will document
all pieces of original media in a standard CoC log.
3. A unique RenewData RDC ID number is created for
each original media item and is cross referenced to the
client’s name and the serial number, if any, on the
original media. The RDC ID number is printed on a bar-
code label and affixed to the original media in a manner
that will not affect existing original media labels.
4. Once the CoC is complete, the original media is moved
by the RenewData materials department to the
Production Vault room outside of the processing center.
5. Only original media that is required for processing is
removed from the Production Vault and allowed into the
processing center. All access to original media is
logged.
11
Chain-of-Custody is a concept in jurisprudence which applies to the handling of evidence (“CoC”). Because evidence can be
used in court, it must be handled in a defined manner to minimize later allegations of tampering or misconduct which can
compromise the case.
8. E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA RETRIEVES EMAIL FILES REQUIRED FOR MULTIPLE MATTERS AND ONGOING
INVESTIGATIONS
Challenge: Confronted with multiple urgent matters and ongoing investigations, a world leading
financial organization needed to retrieve emails and user files that were archived on WORM and other
backup media. The organization was having difficulty retrieving the data from the WORM archives,
which would often take months to produce each time data was required. In addition, the email archiving
system had not worked correctly at times, resulting in large “blackout” time periods of missing archives.
Solution: RenewData was consulted to retrieve data from the organization's email archive system, as
well as from the backup system for the missing blackout periods. RenewData extracted 17 terabytes of
data from the email archiving system using RenewData’s ActiveVault Extraction Suite with non-native
environment technology, which allows extraction of data directly from the backup media without
recreating the original native hardware and software environment. The data was also de-duplicated
and stored in RenewData’s ActiveVault Preservation Manager using single-instance storage, which
resulted in only 6 terabytes of data versus the previous 17 terabytes.
Results: RenewData’s technology enabled extraction of the organization’s email and user file archives
in days versus months and allowed for a fraction of the original data to be stored using ActiveVault’s
single-instance storage technology. The reduction in data also significantly reduced the cost of
document production, as well as the time and costs of legal review. The organization is now able to
efficiently leverage the data stored in the ActiveVault Preservation Manager to better prepare and
respond to follow-on matters, as well as future investigations.
RenewData’s skilled investigators are experts at acquiring and
delivering this evidence from virtually any environment, email or
file type including deleted, encrypted and password-protected
files. RenewData’s investigators then examine and piece together
the details of the evidence. With this information, RenewData
provides detailed analysis and interpretation of retrieved data,
and delivers comprehensive reports, based on targeted
investigation objectives.
Computer Investigations
RenewData experts have extensive investigative experience
involving computer activity and transactional investigations.
RenewData investigators work with clients to develop a plan of
what and whom to target, to ensure that critical data is not
overlooked. Investigators can go on-site to inventory data and
look for hidden sources, as well as help you prepare for
depositions, discovery requests and litigation.
Using RenewData’s patent-pending, proprietary technology,
engineers extract the suspected user activity files and data. The
non-native environment technology allows data extraction on-site
or at RenewData’s facility from virtually any media or computer
environment. It also enables recovery of both active and deleted
data from inaccessible media and deleted files. RenewData
technology also simultaneously de-duplicates and culls data,
making review of the data more efficient and less costly.
Utilizing years of investigative experience, RenewData forensics
experts interpret and analyze the evidence gathered and provide
a detailed report to support the analysis and conclusions. This
evidence is produced in virtually any format or media required for
the specific needs of the case including native files, printed
documents, multiple electronic formats or loadable to review or
storage repositories.
TYPICAL STEPS OF AN INVESTIGATION
1. Client provides access to system and/or facilities for
RenewData to collect evidence.
2. RenewData’s expert creates a forensic image of the
original media which preserves the exact contents of
the media at time of acquisition.
3. RenewData’s forensic expert consults with client to
identify most likely sources of evidence.
4. User activity files and data are extracted from the
media such as tapes or hard drives.
5. RenewData's forensic expert interprets and analyzes
the evidence gathered and provides client with a report
of findings.
6. Production of the final evidence is produced for client in
required format.
7. RenewData's forensic expert provides testimony when
necessary to prove proper chain-of-custody procedures,
collection methodologies and scientifically-based
conclusions.
User activity files and data are retrieved from such
sources as:
• Electronic mail
• Internet/Intranet files accessed
• Documents and files created, accessed and deleted
• Times of user creation, access or deletion
• Server and gateway log files
• Phone and voice records
13
9. PROCESSING
RenewData provides dynamic de-duplication for large volumes of
information and helps ensure that unique metadata and original
content are stored only once. The result is that less time is
needed for processing of significantly more media and less
storage space is required for the resulting data.
Electronic documents are processed with complete text and
metadata preserved and indexed for search accuracy. Virtually
any type of media may be processed for emails and user files and
the RenewData methodology minimizes the amount of data
channeled into the reviewing tool and subsequent production of
the data.
File/Keyword/Date Filtering
When filtering data, RenewData has a set of processes to not
only incorporate the basic instructions provided (i.e., file types,
keywords, dates), but that also consider the true intent of their
clients. RenewData utilizes their industry expertise and
proprietary technology in order to identify all applicable data that
meets their client's objectives.
File Filtering and Introspection
Some solutions rely on the file extension to identify the file type.
However, the file extension is not mandatory and there is no
guarantee the file extension accurately reflects the content of the
file. Merely relying on the stated file extension is not dependable
as it is simple to modify file names and extensions. For example,
a Microsoft Word document with the file name "Trade
Process.doc" can be renamed to "logfile.sys". Checking only for
file type by extension would not identify the actual file type and
content as a Microsoft Word file. ActiveVault avoids the issues
associated with using a file's extension by employing a
verification process during the loading of your data called
Introspection.
Introspection is the ability for ActiveVault to analyze file content
to determine its file type. Introspection will detect the
discrepancy between the declared file-content type and the
actual file-content type. Using the previous example,
Introspection would detect that the content of "logfile.sys" is
actually data from Microsoft Word and therefore potentially
relevant and ensure this file is loaded. Without ActiveVault
Introspection, it is easy to miss data when file extensions have
been changed.
Keyword Search
The ActiveVault Search Engineers and Engagement Managers
work closely with the client to understand the intent of the
keywords (particularly complex) and the type of documents they
are looking for. Then, they take full advantage of the search tools
by deploying a search methodology that maximizes relevancy.
RenewData tests and fine-tunes the results by utilizing a variety
of reports and/or sampling techniques. Often, RenewData is
brought in prior to and during "meet and confer" conferences to
advise, sample, or run reports on the data in order for our clients
to be fully armed with expert advice.
E l e c t r o n i c E v i d e n c e S e r v i c e s
Custom Reports
The following custom reports may be used before a meet and
confer or during the processing step of the e-discovery:
• Extraction Reports provide a high level overview of completed
extractions from assessed media and includes information
regarding the extensions extracted, number of files extracted,
and amount of spaced used during extraction.
• Keyword Search Reports provide a detailed overview of
keyword such results for completed processed files.
• Date Range Reports provide a high level overview of
processed message history over time for completed processed
files, and include Volume ID, Month, Message Count History,
and other statistics.
Custodian Targeting
In order to further cull down the data for relevant information,
RenewData targets specific custodians. Clients provide custodian
names, however locating those custodians can present a
challenge as companies use a variety of naming convention
variables in both their email and file listings. It is the industry
expertise of RenewData that enables the analyzing and manual
targeting of those custodians. RenewData works with clients to
investigate and identify the appropriate custodian, or if the client
prefers, RenewData may generate reports that may assist the
client in their targeting:
• Known Mailbox Reports provide a detailed overview of user
mailbox files successfully extracted and loaded into an
ActiveVault, and include Mailbox Name, PST Volume,
Message Creation Dates, Message Sent Dates, and other
statistics.
• Known User File Reports provide a detailed overview of user
files successfully extracted and loaded into ActiveVault, and
include ActiveVault Category, File Extension Type, File
Extension Description, Number Of Files, and Size of Files.
• Unknown Mailbox Reports provide a detailed overview of user
mailbox files that were either unable to be processed after
extraction or successfully processed but unable to be loaded
into an ActiveVault, and include Volume ID, Mount Points,
Physical Media ID, Job ID, Media Creation Time, Message
Mailbox File Name, Message Count, and other statistics.
15
10. E l e c t r o n i c E v i d e n c e S e r v i c e s
S u c c e s s
RENEWDATA SAVES GLOBAL FINANCIAL INSTITUTION FROM MASSIVE FINES
Challenge: Facing a federal investigation and significant potential daily fines, a global financial
institution with assets of more than $334 billion needed to produce emails for certain individuals and
specific dates in approximately 12 days. The company stored email files on backup tapes at each of its
U.S. locations which needed to be shipped to their main headquarters for processing. The backup tapes
were considered original evidence and could not leave their facility.
Solution: The financial institution made the call to RenewData on Friday. RenewData investigated the
client's needs and delivered a scope of work by Wednesday. The following Friday, RenewData
dispatched a team to go onsite. RenewData's electronic evidence experts processed 122 backup tapes,
equal to more than 854 million text pages, to extract the specific email files. RenewData's professionals
went straight to the data without recreating the native environment of the original hardware and
software used to create the emails. Utilizing its proprietary technology, RenewData delivered the
needed emails to the financial institution on Tuesday, a day ahead of schedule.
Results: The financial institution was able to deliver the email files to the federal agency in time,
consequently saving their company significant daily fines. With RenewData's proprietary technology,
the company also saved additional time and money as there was no need to recreate the native
environment of the emails, a requirement of many competitors.
Loose PSTs and NSFs also can be problematic, as roughly 90% of
these files are not identified with a custodian name. In order to
identify the custodian, custodian mapping must be performed.
This can be extremely expensive because it is a forensic
operation. However, RenewData has a proprietary tool that can
automatically identify the custodian, as well as identify and
eliminate invalid PSTs, saving time and money.
RenewData can merge email on the Exchange Database with
archived email for the same custodian and then de-duplicate
against all, delivering less data for review, and ultimately, for
production.
Proactive Evidence Archiving
The process of capturing and preserving an organizations'
electronic data on an ongoing basis provides significant
reductions of time and money in preparing for current or future
electronic evidence productions. This capability offers the
highest advantage for corporations in responding to audits,
investigations and lawsuits because it provides an accessible
view of electronic evidence across the entire enterprise.
Using a proactive evidence preservation approach, a General
Counsel, the head of corporate litigation, or a third party advisor,
has the tools to assess the company’s legal exposure early in the
litigation process or even before litigation begins.
Advantages of this approach include:
• Quick assessment of legal exposure and better preparation
for subsequent discovery requests.
• Control of litigation costs with the ability to plan strategies
based on real knowledge of your situation.
• Significantly reduced timeframes to produce initial and
subsequent production requests as pre-processed and
indexed native file data is available for immediate search and
output.
• Preparing for future investigations or matters may be
as simple as searching data or adding incremental
data to the existing ActiveVault. This eliminates the
need to reprocess the same backup tapes multiple
times for new matters or subsequent requests.
Multi-Matter Evidence Archiving
RenewData can also offer off-site electronic evidence
preservation and record archiving for single legal matters. This
non-invasive approach works from existing backup tapes and
requires no software installation in an organization's
environment. An ActiveVault preservation archive can be
implemented in a variety of methods based upon the legal and
business requirements.
One or more of the following implementation methods can be
used to create the ActiveVault, including the archiving of:
• Matter specific email and user file data
• All historical email and user file data from a set time period
• All current and future email and user file data
• Email and user file data for only specific target users from a
set time period
Advantages of this approach include:
• No software to install into your IT infrastructure
• No business disruption
• No capital purchase
• Significantly lower storage costs than if done in-house
17
11. S u c c e s s
19
RENEWDATA, TRUSTED ELECTRONIC EVIDENCE ADVISOR TO A GLOBAL SEMICONDUCTOR COMPANY
Challenge: In a preemptive move prior to receiving an electronic evidence production request related
to a government investigation, the outside counsel firm of a global semiconductor company looked
to RenewData’s experts to design a process for ensuring preservation compliance. RenewData’s
consulting services were engaged to create a step-by-step process to comply with discovery requests
employing computer forensic methodology — the Litigation Response Plan (“LRP”). The outside
counsel believed that having such a plan prior to the discovery request would enable the
semiconductor company to significantly minimize the risk of inadvertently overlooking relevant
electronic documents or being accused of spoliation.
Solution: When the discovery request was received, the outside counsel had a well defined process
for gathering the required electronic information in a forensically sound manner. They instructed
RenewData to apply its expertise in acquiring 30 hard drives and three multi-drive servers - including a
server in an international location - over one weekend. RenewData used its unique culling process to
de-duplicate the data, filter, and deliver for only responsive information for privilege review from the
initial data collection as well as subsequent data inputs from other sources. This resulted in decreased
costs and a reduction of the review period by 80%. In summary, RenewData's LRP services reduced
both risk and discovery costs for the law firm's client.
REVIEW
RenewData provides review of the resulting data using iCONECTnxt
review software or if a client prefers can export load files, TIFFs or
links to native for use in other review tools.
As an Application Service Provider for iCONECTnxt, RenewData
enables firms to perform coding, redaction, Bates numbering,
foldering and other review activities on the data. This means your
data never has to leave the RenewData facility, thus ensuring an
increased level of security and integrity of the data.
Review is performed online using a secure web tool that enables for
online review from any location. The web-based system ensures
that all parties involved have equal access to the data. Additionally,
the tool allows reviewers to export the Bates numbered TIFFs of
their choice without requiring vendor assistance. Documents are
available for review in either their native file format or in TIFF
format. The native format uses a viewer that allows viewing of over
350 file types without having to install the applications or any
special plug-ins.
iCONECT Hosting and Review
iCONECT software enables review and management of electronic
and document discovery from anywhere in the world for effective
collaboration with outside counsel, branch offices, and consultants.
With iCONECT software, your review teams can increase
productivity, save time, and lower your litigation costs by taking
advantage of:
• Global web-based access to case information and document
discovery e-mail, native files, images, transcripts, and
documents), so counsel, clients, and experts can work together
on case materials and provide immediate feedback.
• Secure multi-level access, so experts can view only the
information they need to see while sensitive data stays locked
down.
• Case management tools — including a centralized case
calendar, tasks list, and contacts list — that enable counsel,
clients, and experts to stay in sync. Clients can log in to see
what’s coming up.
• Native file viewing in iCONECT’s image viewer that allows you
to streamline your workflow and review over 350 native file
types (including Excel, PDF, and Word) with no plug-ins or
special software required, and save time with bulk-review
options, review templates, and automatic foldering by review
designation.
PRODUCTION
Production and delivery of the client’s responsive documents is a
crucial step in the litigation process. RenewData’s Production Suite
and expertise allow creation of tailored evidence production
solutions designed to address reactive litigation or investigation
matters. RenewData’s experts will help you understand the
advantages of each option and then identify the best direction
based on client specifications.
In addition, the de-duplication of the data prior to the more
expensive production process results in significantly less time and
cost required for production of your responsive data. Delivery of
evidence can be produced in virtually any format or media necessary
to suit the needs of a case.
E l e c t r o n i c E v i d e n c e S e r v i c e s
DOCUMENT PRODUCTION OPTIONS
• Native files
• Merged PST files
• TIFF files
• PDF files
• Printed copies of documents
• Load files for litigation repositories
• Custom reporting to suit the needs of your case
• Download into ActiveVault storage for future needs
13. Technology
ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM
Extraction Suite is designed to image media, extract files
from media and load data into the Preservation Manager. In
order to reduce the likelihood of damaging original media,
typically backup tapes or hard drives, RenewData first
makes a forensic image of the media. All extraction
processing is then completed using the forensic images.
For extracting data from backup tapes, RenewData
has created a suite of non-native environment extraction
software for IBM Tivoli, LEGATO/EMC, VERITAS, Computer
Associates ARCserve, CommVault Galaxy, Hewlett-
Packard and other leading manufacturers.
RenewData uses dynamic de-duplication when loading data
into the Preservation Manager. This process creates a digital
fingerprint using a hash value upon loading, ensuring no
duplicates are loaded and stored in the system.
Discovery Engine is optimized for native file culling and
filtering by keywords and date ranges. The Discovery Engine
can rapidly and accurately index and manage virtually any
native file format. Built on the Oracle database platform, the
Discovery Engine offers unparalleled industry performance
for searching large volumes of native files. Data can be
managed by original source, custodian or data type. A
complete forensic audit trail enables automatic chain-of-
custody tracking back to the original source media.
Production Suite provides multiple production output
options of native file evidence using a flexible de-
duplication methodology. Output can be de-duplicated either
within a single custodian or across multiple custodians.
Production options include native file output, load files with
TIFF or PDF images for popular litigation repositories such as
Concordance and Summation, or in paper format using local
printing partners.
Preservation Manager is a forensically-sound repository
designed for native file data management of email
messages, attachments and user files by legal
professionals. Optimized for managing large volumes of
files, Preservation Manager uses a single-instance storage
("SIS") model in order to store data that is a fraction of its
original size.
The capabilities enabling the storing of data in a forensically
sound manner include:
• Each email message can be traced to the originating
container (i.e. Microsoft Exchange “EDB” file or loose
“PST” file) and the originating source media.
• A user’s email can be recreated at any point in time.
• The history of each email message can be traced
between multiple email server backups, showing when
an email may have disappeared or was moved to a
different folder.
Te c h n o l o g y
23
Additionally, ActiveVault technology is optimized for:
• Scalability - High speed and high volume data extraction from
thousands of backup tapes per day, regardless of the backup
system.
• Capacity - Hundreds of terabytes of evidence can be
processed in a forensically and cost-effective way for multiple
production requests.
• Speed - The ability to extract, index, search and output large
volumes of email and user files in hours and days, rather than
weeks or months.
For a recurring monthly fee, RenewData provides its customers
with secure archiving of their corporate information or electronic
evidence in a proprietary, indexed, searchable data warehouse.
This data warehouse is forensically sound, utilizes RenewData’s
single instance storage technology to minimize storage
requirements and can rapidly produce legal output in a variety of
appropriate formats. In addition, this warehouse can be used by
customers to provide review and management capabilities that
enable them to access their information.
ACTIVEVAULT EVIDENCE MANAGEMENT PLATFORM
RenewData’s ActiveVault Evidence Management Platform
("ActiveVault") is the electronic evidence industry's leading
technology platform for media and data extraction, native file
filtering and production output. ActiveVault allows for the
extraction of electronic information from virtually any electronic
media or computer environment without recreating the native
environment in which the data was stored. As the extracted
data flows off of the media, ActiveVault dynamically de-
duplicates the information while maintaining records about the
data, such as where the duplicate files were located.
This patent-pending platform is designed for rapid execution of
large scale projects enabling large volumes of data to be
processed in the most expeditious manner. ActiveVault is
designed to ensure that legal professionals can achieve their
schedules, maintain high levels of quality and control the
expense of electronic evidence management. This proprietary
platform is not sold or licensed as a separate product and is a
key component of the ComplianceNOW, PreservationNOW and
eDiscoveryNOW offerings.
14. ACTIVEVAULT SINGLE-INSTANCE STORAGE (SIS)
Single-instance storage (“SIS”) is a system’s ability to keep one
copy of content associated with multiple custodians.
For user files, ActiveVault creates a hash value, which is a digital
fingerprint, for the document body and metadata of each user file.
Each user file is de-duplicated upon loading into the AV
Preservation Manager with forensic references to the source file
path and media.
In order to understand how SIS works for email, you must first
understand the parts of an email message. An email message
within Microsoft Exchange server is not stored as a single file.
Instead, it is stored in a database with tables and fields that hold
the data necessary to construct an email message. For example,
when a person wants to view an email message in Microsoft
Outlook, the details of the Inbox folder actually reside in a
database table on the Microsoft Exchange email server. When
someone wants to read a message, Microsoft Exchange takes the
information from all required database tables and combines this
information invisibly to the user so Outlook can then display the
result as a complete email message.
In the database, an email consists of the message body, location
pointers and item properties stored in database tables. The
location pointers and item properties comprise the metadata of a
message. One table in the database, the message table, holds
the message body. Another database table, the message folder
table, holds all of the location pointer information ("References").
Other database tables hold the item properties (e.g. To, From, CC,
BCC, Subject Line, etc.).
The message body can be in multiple formats depending on the
originating email client software. Therefore, a single email body
may actually have multiple formats that must be stored such as
HTML, ASCII Text and Rich Text format. An email with rich text
may appear in Microsoft Outlook with formatting but appears as
plain text in a Blackberry. The Preservation Manager stores
all of these message body formats.
In the case of email, like Microsoft Exchange, ActiveVault’s
single-instance storage method holds one copy of the message
body and attachments within the database. Duplicate references
access the content through a set of database pointers and other
properties, such as message senders and their recipients, which
allow the content to have one-to-many references. For example,
an email sent to 10 people is stored within the Preservation
Manager as a single email body with 11 database record
references of the message. The Preservation Manager stores
other popular email formats, such as Lotus Notes, in the same
method.
In order to ensure the forensic accuracy of SIS and to identify
duplicates, when email data is loaded into Preservation Manager,
RenewData creates digital fingerprints using a hash value for
both the message metadata and the message body.
The SIS model typically reduces the amount of data stored in the
Preservation Manager by 60 - 90%, thus reducing the cost of
storage and increasing search speed. This capability is enabled
by patent-pending technology and is unique to RenewData within
the evidence preservation market.
Te c h n o l o g y
25
Technology
EXAMPLE OF SINGLE INSTANCE STORAGE
“SAME EMAIL IN 3 SEPARATE LOCATIONS“
EXAMPLE OF SINGLE INSTANCE STORAGE
“SAME WORD DOCUMENT IN 3 SEPARATE LOCATIONS“
15. CREATING DIGITAL FINGERPRINTS WITH HASH VALUES
RenewData has implemented industry standard technology to
ensure the integrity of our customer’s data. RenewData uses
hash values to:
• Identify every message, document or file with a digital finger-
print at the start of the production process
• De-duplicate messages, documents and files by comparing
hash values for matching values
• Validate the final production output of messages, documents
and files did not change during processing
By using hash values during validation of the files, RenewData
can ensure the documents extracted from a client's backup
medium are forensically identical to the files delivered
in a production to the client.
What is a Hash value?
“A ‘hash’ (also called a “digest”) is a kind of ‘signature’ for a
stream of data that represents the contents. The closest real-life
analog we can think of is ‘a tamper-evident seal on a software
package’: if you open the box (change the file), it’s detected.”1
The algorithms utilized in creating a hash can detect the
minutest change in the structure of the data stream. For example
the MD5 and SHA-1 hash for:
“The quick brown fox jumped over the lazy dog” are
SHA-1 HASH: f6513640f3045e9768b239785625caa6a2588842
MD5 HASH: 08a008a01d498c404b0c30852b39d3b8
A minor change, such as changing the “d” in dog to “c” results
in an entirely different hash value:
“The quick brown fox jumped over the lazy cog”
SHA-1 HASH: 68361d3bafa5fc245e16c9654f4ec32531535207
MD5 HASH: bd266017bcad42c85a57cc3ae5851bf8
Hash values will even change for changes in punctuation:
“the quick brown fox jumped over the lazy dog”
SHA-1 HASH: 6039d1003323d48347ddfdb5ce2842df758fab5f
MD5 HASH: bb0fa6eff92c305f166803b6938dd33a
It should be noted that hashes are “digests” of files, not the
“encryption” of a file. Encryption is a two-way operation which,
given the right keys, transforms data from a clear text to cipher
text and back. Hashes, on the other hand, compile a stream of
data into a small “digest” that is a unique representation of the
data stream. Hashes are utilized in verifying file integrity, hash
passwords and digital signatures.
Different Hash Algorithms
There are a number of hash algorithms which are utilized today
to create hash values. The most popular is the MD5 hash, a 128-
bit algorithm, which was originally thought to be
cryptographically secure. In August, 2004 a discovery was made
that a “collision” could be created using a digest created with
the MD5 hash. A “collision” occurs when two different data
streams generate the same hash value.
“Because of the discovery of an easy method for generating
collisions, many researchers recommend that replacement
algorithms, such as SHA-1 or RIPEMD-160, be used instead of
MD5.”2
RenewData employs the longer 160-bit SHA-1 hash algorithm to
ensure the integrity of data in ActiveVault Evidence
Management Platform. The SHA-1 hash is one member of a set
of related cryptographic hash functions designed by the National
Security Agency (NSA) and published by the National Institute of
Standards and Technology (NIST).
Te c h n o l o g y
27
Technology
CREATING A HASH VALUE
The creation of a hash value for a file involves the processing of a variable length message into a
fixed-length output. A hash function must be able to process an arbitrary-length message into a fixed-
length output. In practice, this can be achieved by breaking the input up into a series of equal-size
blocks, and operating on them in sequence using a compression function. Most widely-used hash
functions take the form in the diagram below.
In the diagram, a message is segmented into fixed-length blocks and are compressed to an output of the
same size. The combination of the compressed blocks equals the hash value for the entire message.
1 Unixwiz.net Tech Tips, “An Illustrated Guide to Cryptographic Hashes” by Steve Friedl.
2 Wikipedia the Free Encyclopedia, “MD5 (Message-Digest algorithm 5)”, http://en.wikipedia.org/wiki/MD5.
3 Federal Information Processing Standards Publication 180-1, 1995 April 17, Standard for Secure Hash Standard.
16. “The SHA-1 is called secure because it is computationally
infeasible to find a message which corresponds to a given
message digest, or to find two different messages which
produce the same message digest. Any change to a message in
transit will, with very high probability, result in a different
message digest, and the signature will fail to verify.”3
ACTIVEVAULT DE-DUPLICATION PROCESS
De-duplication is the process of removing forensically identical
copies of email messages or files from the production set. Other
vendors in the industry must perform de-duplication as a
separate process because they do not utilize a single-instance
storage model in their systems. Because RenewData already
stores de-duplicated data within ActiveVault, there is no
additional de-duplication that is necessary upon output. Instead,
ActiveVault sometimes must repopulate email files with
messages or directories with user files in order to meet client
"de-duplication" requirements.
RenewData's standard production output repopulation
options are:
Full Repopulation (equivalent to no de-duplication)
• Native Email: The email file includes all messages for the
target user including duplicate messages in all locations.
• Native User Files: The user directories contain all files for the
target user including duplicate files in all locations.
Single-Instance Repopulation Within Target User
(equivalent to within custodian de-duplication)
• Native Email: The email file includes one instance of each
message in the folder by alphabetical sort order where it
resides. Therefore, if message #1 resides in two folders,
Folder A and Folder B, then one output, message #1 will be
included in the email file only in Folder A.
• Native User Files: The user directories contain only one
instance of each file across all locations.
Single-Instance Repopulation Within Folders or
Directories within Target User (equivalent to within
custodian de-duplication)
• Native Email: The email file includes one instance of each
message in any folder where it resides. Therefore, if message
#1 resides in two folders, Folder A and Folder B, then one
instance of message #1 will be included in the email file in
each respective folder.
• Native User Files: The user directories contain only one
instance of each file in each respective directory.
Global Single-Instance Repopulation (equivalent to global
de-duplication)
• Native Email: Only one instance of each message will reside
across all target users.
• Native User Files: Only one instance of each user file will
reside across all target users.
NATIVE TAPE RESTORE VS. NON-NATIVE TAPE
EXTRACTION
Native tape restoration is an IT process whereby all files on a
backup tape are restored to a computer hard drive. The IT staff
uses this process to recover a computer that has crashed. In order
to perform a native tape restoration, someone needs to setup and
configure a computer with the correct type of backup software.
While this option seems simple, there are many complexities. For
example, this process typically works for user files and simple
non-threaded backup software such as Computer Associates
ARCserve and Veritas Backup Exec. However, the native restore
process is much more complex for threaded backup software such
as Tivoli Storage Manager, LEGATO Networker, VERITAS
NetBackup and for email servers.
When restoring files from a threaded backup system, a
database called the catalog or library is required from the
original backup system. When restoring email, the email server
must be set up and configured exactly as the original server.
Native tape restoration typically works well for small volumes
of tapes, however, the cost of computer hardware and software
licensing dramatically increases the cost of restoring tapes on a
large scale. For user files, all files must be restored before de-
duplication can occur. This requirement makes it possible to
overwrite files with the same file name but different contents
and requires twice the amount of storage space for processing.
Non-native tape extraction, RenewData’s method using the
ActiveVault Evidence Management Platform, does not need to
recreate the native environment. Instead, RenewData uses
multiple pods, each pod being a computer with four (4) tape drives,
to create an image of each backup tape onto a hard drive. The
backup tape images are then processed to extract only the
necessary files needed for restoration by using date and file
extension filtering. When this occurs, all files are dynamically de-
duplicated using the SHA-1 hash so only de-duplicated files are
placed onto hard drives; thereby significantly reducing the amount
of required storage space. Email server databases from Microsoft
Exchange and Lotus Notes are then processed in the same manner,
never requiring native email servers to be set up and configured.
This highly efficient process is faster and less expensive than
native restoration, providing significant cost savings to
RenewData’s clients.
Te c h n o l o g y
29
Using RenewData Technology Not Using RenewData Technology
Extract data from 100 backup tapes
.5 days
Load extracted data for 10 target users into ActiveVault
and store in de-duplicated format (data readily
available from storage for follow-up requests) 2 days
Keyword filtering and production (10 target
users, 10 keywords) 2 days
Total 4.5 days
Recreate native media environment, including
hardware and software purchase, setup & testing 23 days
Restore 100 backup tapes to native environment
and output data (data not readily available for
follow-up requests) 37 days
Keyword filtering and production (10 target
users, 10 keywords) 4 days
Total 64 days
(does not include de-duplication)
Time savings based on a hypothetical project. Your results may vary depending on number and type of backup tapes, amount of data,
number of users and number of responsive keywords.
18. COMPANY PROFILE
RenewData Corp.®
a privately held company, was formed in 2001
by combining the assets and expertise of two companies, DSTX
Limited and Progressive Data Recovery. This combination brought
together a group of highly accomplished legal and technology
experts who recognized a growing legal need for fast retrieval of
large volumes of electronic data to be used for evidence.
RenewData is a leading provider of electronic evidence services
and data migration for corporations and law firms that need
strategic proactive and immediate reactive solutions for audits, e-
discovery and investigations. RenewData's superior legal
expertise features litigation response planning, forensic
investigation services, electronic data extraction, litigation
production services, evidence preservation archiving services and
Daubert-challenged expert witness services.
The uniqueness of RenewData's approach is a combination of
being a strong legal services company supported by market-
leading extraction and archiving technology that enables high
speed, high volume processing of data directly from electronic
communications systems and indirectly from legacy or complex
backup or computer systems.
RenewData takes great pride in providing legal and technical
proficiency, as well as exceptional client relationships and
meticulous attention to detail. We evaluate every client's specific
needs, then provide the most cost-effective and timely solution.
Our customer testimonials are proof that we have succeeded and
we will continue to make client solutions our first priority.
T h e C o m p a n y
33
S e c u r i t y
HIGH SECURITY STATE-OF-THE-ART FACILITY
RenewData’s state-of-the-art processing center is designed to ensure that critical, one-of-a-kind
electronic evidence is securely and safely managed against theft, fire and loss. This type of evidence
safeguarding is increasingly important for today's corporations and RenewData has addressed this
need with a facility that utilizes the latest security system technology.
RenewData’s processing facility features multiple layers of security and safety devices to
protect the integrity of the critical data including:
• Government-level physical security
• Multi-zoned, role-based security access system requiring both photo ID keycards and fingerprint
biometrics
• Video cameras with digital recording throughout the facility to monitor movement and activity
• Double-door access to the production facility. This “man trap” access requires the first door to
close before the security system allows the second door to open
• Interior walls composed of either concrete or steel plating
• Redundant power and cooling systems
• Dry chemical fire suppression system
• Secure Production Vault for evidence receiving and chain-of-custody documentation
• Secure vault for work-in-process storage
• Secure vault within processing center for highly-sensitive evidence processing
• 24x7 facility monitoring by ADT Security Services