electronic discovery

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name

Don't Let Your Business Get Buried Under Digital Debris

Published By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : 
compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy, information governance
    
IBM

e-Life Sciences 2010: Enabling a Trusted Electronic Value Chain

Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace

Email Archiving: Understanding the Reasons, Risks and Rewards

Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security, backup and recovery, email security, data protection, search and retrieval
    
Proofpoint

Ensure the Integrity of your Content: ProofMark System Technical Overview

Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace

IDC Techology Spotlight: E-Discovery Success Starts at the Beginning

Published By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast

IDC Techology Spotlight: E-Discovery Success Starts at the Beginning

Published By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast

Laying a Strong Foundation: Building your Legal Hold Process with Code42 CrashPlan

Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42

Osterman Research: Why You Must Archive Business Content And What You Can Do With It

Published By: Mimecast     Published Date: Dec 20, 2018
The right solution for archiving electronic content provides the foundation supporting the conventional, defensive applications for data retention such as compliance and e-discovery; but also the proactive applications that enable competitive and other advantages. Sponsored by Mimecast, this paper from Osterman Research details how archiving trends and use cases are changing and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast

Predictive Coding: The Next Frontier in Legal eDiscovery

Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization, networking, security, it management, storage, data management
    
Rand Secure Archive

Software-as-a-Service: An Ideal E-mail Archive Solution for Medium-Size Businesses

Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, backup and recovery, storage management, service oriented architecture, email archiving
    
Mimecast

The Digital Signature Paradox

Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace

The Impact of the New FRCP Rules on Your Business

Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance, e-discovery, legal, law firm, mindshift, data management, secure content management
    
mindSHIFT

The Information Governance Maturity Model: A Foundation for Responding to Litigation

Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices, business intelligence
    
ARMA

The Principles of Electronic Agreement Legal Admissibility

Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace

Understanding ESI Technology and Workflows

Published By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : 
e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance, database security
    
Forensics Consulting Solutions

Why Should You Archive Your Email With a Hosted Service?

Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
123Together
Search      

Add Research

Get your company's research in the hands of targeted business professionals.