Corporate EDiscovery Strategies What Corporations Need from Their Vendors - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Corporate EDiscovery Strategies What Corporations Need from Their Vendors

Description:

Preserve systems/documents once litigation is anticipated ... Forensic Image. Do I really need a forensic image of the drive? C.Y.A. ... – PowerPoint PPT presentation

Number of Views:65
Avg rating:3.0/5.0
Slides: 14
Provided by: pamelad5
Category:

less

Transcript and Presenter's Notes

Title: Corporate EDiscovery Strategies What Corporations Need from Their Vendors


1
Corporate E-Discovery StrategiesWhat
Corporations Need from Their Vendors
  • Presented by
  • Kurt Jensen, President

2
Post Zubulake
  • Preserve systems/documents once litigation is
    anticipated
  • Suspend routine retention/destruction policies
  • Put Litigation hold in place to ensure
    preservation of relevant documents
  • Identify documents of key players and preserve
    this information

3
Multinationals Multiple Jurisdictions (1)
  • Complying with both US Foreign data protection
    and privacy legislation
  • (Ex. EU Data protection and US Sarbanes-Oxley
    Act)
  • Selection of Discovery vendors may satisfy one
    court but violate law in another
  • CPR Disclosure Statement confirming a search of
    electronic data. (England Wales)
  • Disclosure of media searches NOT conducted
  • What types of devices
  • (1)International Financial Law Review article
    Multinationals Face e-Discovery Challenges,
    January 2006, Steven Bennett Sam Miller

4
Pre-Collection Corporate Methodologies
Strategies
  • Hash databases per custodian
  • Lock down shared server space restrict use
  • Removal of all electronic files from server
  • Delete all emails Print what you want
  • Litigation holds

5
Document Collection Do It Yourself
  • Cost effective, Forensically Defensible
  • Targeted Data Collection
  • Mitigate costs by deciding on
  • Custodians
  • Search Terms
  • Managers Involvement
  • IT Involvement

6
Weighing The Risks
  • Spoliation
  • Meaning
  • Risk Reward
  • Metadata
  • Emails
  • Attachments
  • File Level Metadata
  • System Level Metadata

7
Tools for Collection
dtSearch
Sherpa
  • Targets a Directory
  • Builds Table/Index
  • Searches Tables
  • Targets a Directory
  • Looks at Source File
  • IDs for Production

Results
  • Does not alter properties if performed on source
    drive.
  • Creates files that didnt exist prior to indexing.
  • Alters file properties
  • No tables generated
  • Goes through real data

8
Forensic Image
  • Do I really need a forensic image of the drive?
  • C.Y.A.
  • Pennywise but pound foolish!

9
Alternative Collection Method
  • Videotape collection
  • Restricted access to servers
  • Complex Systems
  • Sensitive information
  • Is it Forensically Defensible ?

10
Document Processing Review
  • Big Brother features
  • Third party vendors
  • Liaison between Corporate Counsel and Outside
    Counsel
  • Housing data internally
  • Must be inaccessible

11
Corporate RFIs
  • On-line vs. near-line storage capability
  • Confidentiality requirements of vendor and vendor
    employees
  • Questions regarding amendments to FRCP and
    vendors plans to handle
  • General counsel is assigning their own staff to
    review
  • Some type of concept search/linguistic pattern
    tools required

12
Challenges for the Vendor
  • Being a Chameleon
  • Walking fine line between Corporation and law firm

13
Questions
Write a Comment
User Comments (0)
About PowerShow.com