SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Managing E-Discovery Risks: What You Don’t Know  Can  Hurt You! Practical Steps for Risk Managers to Gain Control of Electronically Stored Information Before and During Litigation REBEX Conference October 24, 2008  11:30 a.m. Fred Travis, Principal Risk Management Consulting [email_address]
Scope of the ESI Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-Discovery Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Spoilation & Sanctions ,[object Object],[object Object],[object Object],[object Object]
ESI Issues & Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Risk Management Questions About e-Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
RM Questions About ESI Controls & Assessments ,[object Object],[object Object],[object Object]
ESI Risk Management Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management Steps  for ESI Compliance ,[object Object],[object Object],[object Object],[object Object]
Electronic Document Retention Policies & Procedures ,[object Object],[object Object],[object Object],[object Object]
Critical ESI Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object]
ESI Preservation ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Legal Hold” Policy & Procedures ,[object Object],[object Object],[object Object]
“ Legal Hold” Policy & Procedures ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Bottom Line ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QUESTIONS?

Weitere Àhnliche Inhalte

Was ist angesagt?

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
Positive Hack Days
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
Recommind
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Kym Canty
 

Was ist angesagt? (20)

Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
 
Oracle EBS Data Risks During a Divestiture
Oracle EBS Data Risks During a DivestitureOracle EBS Data Risks During a Divestiture
Oracle EBS Data Risks During a Divestiture
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Preparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA AuditPreparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA Audit
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds
Can we overcome sec...
 
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
 
Preparing for the Worst: Confronting Organizational Risk with Training Strategy
Preparing for the Worst: Confronting Organizational Risk with Training StrategyPreparing for the Worst: Confronting Organizational Risk with Training Strategy
Preparing for the Worst: Confronting Organizational Risk with Training Strategy
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
Role management
Role managementRole management
Role management
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 

Ähnlich wie E Discovery V2.Pdf

E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk Managers
Fred Travis
 
EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project plan
Donna_Maree_Findlay
 
Compliance Internal Investigation
Compliance Internal Investigation Compliance Internal Investigation
Compliance Internal Investigation
Nexsen Pruet
 
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docxCHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
mccormicknadine86
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
susanschei
 

Ähnlich wie E Discovery V2.Pdf (20)

E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk Managers
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
2009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 1102009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 110
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project plan
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Breach response
Breach responseBreach response
Breach response
 
Compliance Internal Investigation
Compliance Internal Investigation Compliance Internal Investigation
Compliance Internal Investigation
 
Checklist gestiĂłn de registros en el gobierno. cĂłmo hacerlo bien en 12 pasos?
Checklist gestiĂłn de registros en el gobierno. cĂłmo hacerlo bien en 12 pasos?Checklist gestiĂłn de registros en el gobierno. cĂłmo hacerlo bien en 12 pasos?
Checklist gestiĂłn de registros en el gobierno. cĂłmo hacerlo bien en 12 pasos?
 
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docxCHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity Clients
 

KĂŒrzlich hochgeladen

Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

KĂŒrzlich hochgeladen (20)

BhubaneswarđŸŒčRavi Tailkes ❀CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
BhubaneswarđŸŒčRavi Tailkes  ❀CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...BhubaneswarđŸŒčRavi Tailkes  ❀CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
BhubaneswarđŸŒčRavi Tailkes ❀CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ...
 
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
 
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
 
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfSeeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
 
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
 
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdf
 
Vip Call Girls Ravi Tailkes 😉 Bhubaneswar 9777949614 Housewife Call Girls Se...
Vip Call Girls Ravi Tailkes 😉  Bhubaneswar 9777949614 Housewife Call Girls Se...Vip Call Girls Ravi Tailkes 😉  Bhubaneswar 9777949614 Housewife Call Girls Se...
Vip Call Girls Ravi Tailkes 😉 Bhubaneswar 9777949614 Housewife Call Girls Se...
 
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
 

E Discovery V2.Pdf

  • 1. Managing E-Discovery Risks: What You Don’t Know Can Hurt You! Practical Steps for Risk Managers to Gain Control of Electronically Stored Information Before and During Litigation REBEX Conference October 24, 2008 11:30 a.m. Fred Travis, Principal Risk Management Consulting [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.

Hinweis der Redaktion

  1. Good morning. The subtitle of this presentation should probably be : You have Mail – Way too much! Or, how about “How Your Search System Could keep you out of Jail”. Both are the titles of recent articles on the subject of e-Discovery. Because of recent changes in Federal Discovery rules, that Patrick has explained, it is now imperative that organizations get control of their email, Microsoft Office documents and other electronic materials, before unanticipated discovery demands lead to huge expenses and possible fines, penalties and adverse judgments. Hopefully, we will give you a starting point for practical steps you can take at your organizations to create, execute and maintain plans and actions to reduce risks and gain control over the ever-expanding morass of electronic information. Fred Travis, Principal Consultant Risk Management Consulting REBEX: Managing e-Discovery Risks October 24, 2008