SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
tently manipulated. Challenges to data

E-Discovery Technology                                                                                 authenticity can jeopardize the outcome of the
                                                                                                       litigation matter.
                                                                                                            If a professional service is needed,
                                                                                                       choose a company that has proven litiga-

Challenges and Solutions                                                                               tion support experience and that has per-
                                                                                                       sonnel whose experience and training can
                                                                                                       be verified. In many cases, those experts
                                                                                                       working on the case can be called upon by
                  By Ronald M. Godfrey, Computer Forensic Examiner, ITForensics.com                    the court to submit declarations detailing
                                                                                                       activities, and in some cases are required to
                                                                                                       provide oral testimony.
                                                                                                            Whether e-discovery is being done in-
                                                                                                       house or by a third party, having a wide
T  oday’s legal environment is very complex.
Attorneys are faced with myriad challenges to
                                                    the specific triggers identified as the cause of
                                                    the death. If an individual died as a result of
                                                                                                       breadth of technical experience is key as
                                                                                                       the e-discovery process unfolds. Having
effectively and efficiently support the digital     taking a certain medication, the attorney          the ability and tools available to collect
demands associated with a growing number of         might want to target the pharmaceutical com-       data from cell/smart phones, hard drives
cases. Many of these challenges are created by      pany’s servers and systems that contain com-       and servers, SharePoint websites, email
the rapidly advancing technologies in both the      munications or analysis relating to tests docu-    servers and local systems is critical.
corporate and social spheres. When the focus        menting the drug’s side effects.                        The last question to ask is what kinds of
is electronic discovery, the technologies that           Once the appropriate areas and nature of      software should be employed for doing e-
create these challenges have advanced faster        targeted data have been recognized, the next       discovery. There are many factors to con-
than the technology used to identify, collect and   question is how to process the information in      sider including: type of data that needs to
produce data. This creates stress, delays and       those relevant data stores. A good idea is to      be searched, locations and types of data
expense for all parties involved. However,          team with an information technology special-       stores, budgetary limitations, resources
these stresses can be minimized by doing some       ist, either in-house or through a third party.     available, the amount of data to be
simple pre-discovery planning. Considering                                                             processed and the time constraints.
questions like the ones below can narrow the
initial e-discovery scope and increase the
prospect of obtaining relevant data from the             “Electronic data is                           Taking Action
onset of a case.                                                                                           There are many tools on the markets and
                                                                                                       each should be considered based on the
                                                                                                       unique characters of your case. One of the
What You Should Know                                   no longer contained                             tools used by ITForensics is Sherpa
    The first question to ask when drafting an                                                         Software’s Discovery Attender. This software
e-discovery request is “where is the relevant                                                          is designed to assist the attorney or paralegal
data most likely to be stored for this case?”
Electronic data is no longer contained in a
                                                      in a centralized local                           in the management of data and information
                                                                                                       during the e-discovery collection process. DA
centralized local environment. It is mobile and                                                        is capable of searching mailboxes located on
global! Important information can be found                                                             the server, personal folders files (.PSTs) and
on local machines, networked servers, smart              environment. It is                            networked file shares or servers. Search
phones or even be hosted on the Internet. The                                                          results can be de-duplicated, thus reducing the
increased use of cloud computing adds even                                                             amount of data required to be reviewed and
further complexity to the process because
users can potentially access and manipulate
                                                       mobile and global!”                             stored. Other popular software tools include
                                                                                                       LAW, used for processing ESI data;
data via any Internet-connected device.                                                                Concordance, commonly used for reviewing;
    Identifying these data stores will help         Their expertise can be harnessed to effective-     and the Clearwell E-Discovery Platform, a
determine what type of process and tech-            ly outline how to best access the relevant elec-   well-known tool for its early case assessment
nology can be used to obtain the data. This,        tronically stored information. The specialist      features.
in turn, keeps the expenses and requests            can also advise the attorney on the complexi-          E-discovery can be a stressful and com-
reasonable without creating an undue bur-           ties in searching for the data and provide rec-    plicated process. Allocate time at the onset
den to the responsive party.                        ommendations how to best extract the data.         of the litigation case to identify relevant
    Another question to keep in mind is the         Having an idea of what type of data is relevant    data sources, data types, and who will col-
nature of the litigation and types of custodians    to the case, and where to look for the data is     lect the data in a professional manner. This
involved. This determines what kind of data         crucial to a successful litigation proceeding.     will reduce costs, improve efficiency and
could be responsive and where it is likely to           From this perspective, it is important to      benefit the litigation proceedings. Asking
reside. For example, responsive data for a          ask “do we have the expertise, resources           the right questions and utilizing the right
wrongful termination suit might reside in the       and tools to search and extract the data? Or,      technology and resources can further
email accounts of specific human resources          do we need a professional service?”                streamline the process and reduce stress
employees who were involved in the termina-             Probably one of the most important             along with time and expense. T
tion process. Documents relative to the spe-        aspects of collecting electronic evidence is
cific justification for the termination might                                                          Ron Godfrey is a digital forensics examiner at IT
                                                    validating authenticity. The data must be col-     Forensics, Inc. He teaches digital forensics at Highline
reside on a specific HR file share.                 lected in a manner that retains its original
    Another example could be a wrongful                                                                Community College in Des Moines, WA, and has worked
                                                    form. This makes having the right expertise        for a Fortune 100 company’s IT security department.
death case. It would be important to identify       important because inexperienced personnel          Godfrey has a total of 12 years in IT and IT security in the
data stores containing information related to       can increase the risk that data will be inadver-   corporate environment.


                                                                                                                     KMWorld February 2012                   S11

Weitere ähnliche Inhalte

Andere mochten auch

Historia de una maestra
Historia de una maestraHistoria de una maestra
Historia de una maestraEstherceta
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernaderodogffs86
 
Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Andre Golliez
 
Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012mpfcomunicacao
 
Febrero 11 y12
Febrero 11 y12Febrero 11 y12
Febrero 11 y12fbcat
 
Andy m's potw
Andy m's potwAndy m's potw
Andy m's potwssabatini
 
Projeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoProjeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoidarlete1953
 

Andere mochten auch (13)

Transacciones
TransaccionesTransacciones
Transacciones
 
Historia de una maestra
Historia de una maestraHistoria de una maestra
Historia de una maestra
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernadero
 
Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115
 
Reflexion tecnologia
Reflexion tecnologiaReflexion tecnologia
Reflexion tecnologia
 
Page0082
Page0082Page0082
Page0082
 
Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012
 
Feliz navidad
Feliz navidadFeliz navidad
Feliz navidad
 
Febrero 11 y12
Febrero 11 y12Febrero 11 y12
Febrero 11 y12
 
Andy m's potw
Andy m's potwAndy m's potw
Andy m's potw
 
Projeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoProjeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete pronto
 
Fração geratriz
Fração geratrizFração geratriz
Fração geratriz
 
Animes
AnimesAnimes
Animes
 

Mehr von Sherpa Software

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information GovernanceSherpa Software
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media Sherpa Software
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildSherpa Software
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationSherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

Mehr von Sherpa Software (15)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

E-Discovery Technology Challenges and Solutions

  • 1. tently manipulated. Challenges to data E-Discovery Technology authenticity can jeopardize the outcome of the litigation matter. If a professional service is needed, choose a company that has proven litiga- Challenges and Solutions tion support experience and that has per- sonnel whose experience and training can be verified. In many cases, those experts working on the case can be called upon by By Ronald M. Godfrey, Computer Forensic Examiner, ITForensics.com the court to submit declarations detailing activities, and in some cases are required to provide oral testimony. Whether e-discovery is being done in- house or by a third party, having a wide T oday’s legal environment is very complex. Attorneys are faced with myriad challenges to the specific triggers identified as the cause of the death. If an individual died as a result of breadth of technical experience is key as the e-discovery process unfolds. Having effectively and efficiently support the digital taking a certain medication, the attorney the ability and tools available to collect demands associated with a growing number of might want to target the pharmaceutical com- data from cell/smart phones, hard drives cases. Many of these challenges are created by pany’s servers and systems that contain com- and servers, SharePoint websites, email the rapidly advancing technologies in both the munications or analysis relating to tests docu- servers and local systems is critical. corporate and social spheres. When the focus menting the drug’s side effects. The last question to ask is what kinds of is electronic discovery, the technologies that Once the appropriate areas and nature of software should be employed for doing e- create these challenges have advanced faster targeted data have been recognized, the next discovery. There are many factors to con- than the technology used to identify, collect and question is how to process the information in sider including: type of data that needs to produce data. This creates stress, delays and those relevant data stores. A good idea is to be searched, locations and types of data expense for all parties involved. However, team with an information technology special- stores, budgetary limitations, resources these stresses can be minimized by doing some ist, either in-house or through a third party. available, the amount of data to be simple pre-discovery planning. Considering processed and the time constraints. questions like the ones below can narrow the initial e-discovery scope and increase the prospect of obtaining relevant data from the “Electronic data is Taking Action onset of a case. There are many tools on the markets and each should be considered based on the unique characters of your case. One of the What You Should Know no longer contained tools used by ITForensics is Sherpa The first question to ask when drafting an Software’s Discovery Attender. This software e-discovery request is “where is the relevant is designed to assist the attorney or paralegal data most likely to be stored for this case?” Electronic data is no longer contained in a in a centralized local in the management of data and information during the e-discovery collection process. DA centralized local environment. It is mobile and is capable of searching mailboxes located on global! Important information can be found the server, personal folders files (.PSTs) and on local machines, networked servers, smart environment. It is networked file shares or servers. Search phones or even be hosted on the Internet. The results can be de-duplicated, thus reducing the increased use of cloud computing adds even amount of data required to be reviewed and further complexity to the process because users can potentially access and manipulate mobile and global!” stored. Other popular software tools include LAW, used for processing ESI data; data via any Internet-connected device. Concordance, commonly used for reviewing; Identifying these data stores will help Their expertise can be harnessed to effective- and the Clearwell E-Discovery Platform, a determine what type of process and tech- ly outline how to best access the relevant elec- well-known tool for its early case assessment nology can be used to obtain the data. This, tronically stored information. The specialist features. in turn, keeps the expenses and requests can also advise the attorney on the complexi- E-discovery can be a stressful and com- reasonable without creating an undue bur- ties in searching for the data and provide rec- plicated process. Allocate time at the onset den to the responsive party. ommendations how to best extract the data. of the litigation case to identify relevant Another question to keep in mind is the Having an idea of what type of data is relevant data sources, data types, and who will col- nature of the litigation and types of custodians to the case, and where to look for the data is lect the data in a professional manner. This involved. This determines what kind of data crucial to a successful litigation proceeding. will reduce costs, improve efficiency and could be responsive and where it is likely to From this perspective, it is important to benefit the litigation proceedings. Asking reside. For example, responsive data for a ask “do we have the expertise, resources the right questions and utilizing the right wrongful termination suit might reside in the and tools to search and extract the data? Or, technology and resources can further email accounts of specific human resources do we need a professional service?” streamline the process and reduce stress employees who were involved in the termina- Probably one of the most important along with time and expense. T tion process. Documents relative to the spe- aspects of collecting electronic evidence is cific justification for the termination might Ron Godfrey is a digital forensics examiner at IT validating authenticity. The data must be col- Forensics, Inc. He teaches digital forensics at Highline reside on a specific HR file share. lected in a manner that retains its original Another example could be a wrongful Community College in Des Moines, WA, and has worked form. This makes having the right expertise for a Fortune 100 company’s IT security department. death case. It would be important to identify important because inexperienced personnel Godfrey has a total of 12 years in IT and IT security in the data stores containing information related to can increase the risk that data will be inadver- corporate environment. KMWorld February 2012 S11