SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Legacy Data Remediation: A Practical Approach
Presented to the Association of Litigation Support Professionals
                                     Wednesday, March 30, 2011
Today’s Panel
Andy Cosgrove
Partner, Redgrave LLP
acosgrove@redgravellp.com


Christian Rummelhoff
Senior Analyst, Redgrave LLP
crummelhoff@redgravellp.com


Diana Fasching
Senior Analyst, Redgrave LLP
dfasching@redgravellp.com

                                               2
Presentation Goals

• Gain legal and technical perspectives into a legacy
  data remediation project

• Identify unique issues associated with the remediation
  of paper and electronic legacy data

• Introduce ways to manage costs and limit burdens on
  everyday business operations




                                                           3
Top 5 Reasons to Take Notice

TOP   #5) Litigation Costs

      #4) Litigation Risks; Why Keep Tomorrow’s
          Smoking Gun?

      #3) Reputation Risks; The WikiLeaks Effect

      #2) State & Federal Privacy Regulations

      #1) Retention Costs; The Box Burden

                                                   4
Re-Defining Legacy Data

Paper:                               Electronic:
•   Paper files, Photographs,        •   Old Backup Tapes, Backups
    Marketing Materials, and Other       Made Prior to Data Migration
    Hardcopy Documents               •   Orphaned ESI (e.g.
•   Materials Stored On and/or           departmental file shares)
    Offsite (e.g. Iron Mountain)     •   Inactive/Decommissioned
•   Documents in the Possession          Servers
    of Third Parties                 •   Retained Collections of Hard
                                         Drives, CDs or other Media
                                     •   Data in the Possession of Third
                                         parties

                                                                           5
A Process for Addressing Legacy Data
        Iterative                    High-Level                 Risk-Focused

  Identify Disposition            Understand Data           Prepare Information
      Constraints                    Store(s)                 for Comparison
- Retention Obligations      -   Origins                    - Preservation Matrix and
- Statutory, Regulatory,     -   Date Ranges                  Materials Index
  Common Law Requirements    -   Formats                    - Similar Measures Allow
- Contractual Requirements   -   Content                      Direct Comparison
- Legal Hold Obligations     -   Custodian




  Disposition of Data        Apply Risk Assessment
                               (Reasonable Investigation)
                             - Is Info Likely Relevant?
                             - Is Info Likely Unique?
                             - Duty to Preserve/Maintain?


                                                                                        6
Remediation Framework/Considerations
•   3 Key Considerations: Iterative, High Level, Risk Focused
•   General Tips
    –   Work From Available Information; Infer Where Reasonable
    –   Identify Best Value Approaches to Additional Investigation
    –   Document Each Step

•   Identify Deletion/Destruction Constraints
    –   Identify/Clarify Constraints at Issue Using Measurable Descriptors
•   Understand Data Stores
    – Origins, Date Ranges, Formats, Content, Custodian
    – Key Differences in Population – Breakdown Material into Groups
    – Additional Investigation: Sampling, Interviews, Database Mining

•   Prepare Information for Comparison
    –   Constrains and Materials - Use Same/Similar Descriptors
•   Apply Risk Assessment to Identify Disposable Information
                                                                             7
Paper – A Real World Example
                         Situation    Process    Resolution


• Fortune 250 company with over 50K boxes of hard
  copy paper records eligible for disposition under the
  record schedule

• Desire to dispose of material not subject to legal hold

• Significant information available about the material in
  the boxes; less information available on open legal
  holds

• Cost of assessment needed to be proportional to the
  cost of storing the material
                                                              8
Paper – A Real World Example
                                   Situation         Process        Resolution


•   Validated information about the materials
    – Sampled boxes to confirm accuracy of indices
    – QC missing and suspect information (e.g., dates)
•   Gathered information regarding legal holds
    – Reviewed all open holds and used available matter reporting capabilities
    – Follow-up
•   Created “Preservation Matrix”
    – Consolidated holds into manageable number of categories
    – Each category had as broad a scope as the sum of the component holds
    – Primary considerations: Record Code, Date Range; Also Geography,
      Department,
    – Obtained case-team sign-off on hold scope assumptions
    – High quality of indices meant no need for equivalent categorization of
      material
•   Iterative, Risk-Based Assessment
                                                                                 9
Paper – A Real World Example
                                 Situation         Process        Resolution


• Recommended reasonable and legally defensible
  disposition of specific material
   – One third cleared at the first iteration (Record Code)
   – Another third cleared at the Record Code by date iteration
   – Final third held by a handful of cases requiring case-specific additional
     follow-up (collection, case team identification of relevant materials)
• Other significant highlights:
   – Process from took longer than originally planned –the evolving hold
     environment (as cases open/close) complicated analysis
   – Outside counsel required some case-specific additional steps
• Next time…
   – Identify critical cases (and most conservative attorneys) and involve
     those case teams much earlier in the process to prevent delays

                                                                                 10
ESI – A Real World Example
                             Situation       Process       Resolution


• Global 500 company with over 60K legacy media
  items in one division
• Mostly backup tapes
   – Varying tape types and backup mechanisms (including NDMP)
• Media assumed to contain emails, user files,
  application data and other unknown content
• Little to no inventory information available for a large
  subset of the media items
• Desire to dispose of this information to reduce legal
  risk and storage costs



                                                                        11
ESI – A Real World Example
                                  Situation         Process         Resolution


•   Identified team members
•   Researched as much information as possible regarding
    media items and legal holds
•   Established sampling hypothesis
    – Materials on backup media were largely duplicative because legal hold
      custodians were preserving materials in active storage
•   Developed sampling strategy
    – Selected less than 50 (out of over 60K) media items to sample, targeting
      different date ranges and content (both email and file share backups)
•   Restored, indexed and then filtered data based on legal
    hold keywords
•   Reviewed for “responsiveness” and selected statistically
    valid set of emails and user files
•   Worked with custodians (and IT for former employees) to
    validate hypothesis
                                                                                 12
ESI – A Real World Example
                               Situation        Process       Resolution


• Recommended reasonable and legally defensible
  disposition of media items
• Proceeded with destruction/recycling of approximately
  80% of legacy media items
• Continued hold on the remaining media items
• Other significant highlights:
   – Process from kick-off to recommendations took about 8 months —
     several months longer than originally planned
   – Had to be flexible and adjust plan as issues were encountered
   – End result was well-received within Legal and by IT
   – Considering different approach on subsequent projects to minimize
     vendor costs


                                                                           13
Other Real World Examples




Examples?



                                  14
Additional Resources

• www.redgravellp.com:
  – Webcasts: “What do you want your legacy to be?”
  – Link: Sedona Commentary on Inactive Information
  – Podcast Links:
     • Dealing with Legacy Data – What to do About ESI Messes Today
     • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools


• Organizations:




                                                                                  15

Weitere ähnliche Inhalte

Was ist angesagt?

Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open ScienceOpenAIRE
 
Data-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksData-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksMicah Altman
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Martin Donnelly
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Jeph Pedrigal
 
Needs for Data Management & Citation Throughout the Information Lifecycle
Needs for Data Management & Citation Throughout  the Information LifecycleNeeds for Data Management & Citation Throughout  the Information Lifecycle
Needs for Data Management & Citation Throughout the Information LifecycleMicah Altman
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondBenoit Pauwels
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)OpenAIRE
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing DataOpenAIRE
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open ScienceOpenAIRE
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBigDataExpo
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageAccenture
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Patricia M Watson
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?OpenAIRE
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introductionMichael Day
 

Was ist angesagt? (20)

State Agency Basic Training
State Agency Basic TrainingState Agency Basic Training
State Agency Basic Training
 
Lecture 01 Data Mining
Lecture 01 Data MiningLecture 01 Data Mining
Lecture 01 Data Mining
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Electronic Records Training
Electronic Records TrainingElectronic Records Training
Electronic Records Training
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science
 
Data-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksData-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation Works
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210
 
Needs for Data Management & Citation Throughout the Information Lifecycle
Needs for Data Management & Citation Throughout  the Information LifecycleNeeds for Data Management & Citation Throughout  the Information Lifecycle
Needs for Data Management & Citation Throughout the Information Lifecycle
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the Pond
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & Governance
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 

Ähnlich wie Practical Legacy Data Remediation - Redgrave LLP

Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesKathirvel Ayyaswamy
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital PreservationBill LeFurgy
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data ManagementJamie Bisset
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data managementopl10
 
Introduction to data management
Introduction to data managementIntroduction to data management
Introduction to data managementCunera Buys
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementMarieke Guy
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdfGnanavi2
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...ICPSR
 
Graham Pryor
Graham PryorGraham Pryor
Graham PryorEduserv
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management PlanKristin Briney
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersRebekah Cummings
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementKristin Briney
 

Ähnlich wie Practical Legacy Data Remediation - Redgrave LLP (20)

BAS 250 Lecture 1
BAS 250 Lecture 1BAS 250 Lecture 1
BAS 250 Lecture 1
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
DBMS
DBMSDBMS
DBMS
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data management
 
Introduction to data management
Introduction to data managementIntroduction to data management
Introduction to data management
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data Management
 
20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Data cycle health
Data cycle healthData cycle health
Data cycle health
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Graham Pryor
Graham PryorGraham Pryor
Graham Pryor
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management Plan
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate Researchers
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data Management
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Practical Legacy Data Remediation - Redgrave LLP

  • 1. Legacy Data Remediation: A Practical Approach Presented to the Association of Litigation Support Professionals Wednesday, March 30, 2011
  • 2. Today’s Panel Andy Cosgrove Partner, Redgrave LLP acosgrove@redgravellp.com Christian Rummelhoff Senior Analyst, Redgrave LLP crummelhoff@redgravellp.com Diana Fasching Senior Analyst, Redgrave LLP dfasching@redgravellp.com 2
  • 3. Presentation Goals • Gain legal and technical perspectives into a legacy data remediation project • Identify unique issues associated with the remediation of paper and electronic legacy data • Introduce ways to manage costs and limit burdens on everyday business operations 3
  • 4. Top 5 Reasons to Take Notice TOP #5) Litigation Costs #4) Litigation Risks; Why Keep Tomorrow’s Smoking Gun? #3) Reputation Risks; The WikiLeaks Effect #2) State & Federal Privacy Regulations #1) Retention Costs; The Box Burden 4
  • 5. Re-Defining Legacy Data Paper: Electronic: • Paper files, Photographs, • Old Backup Tapes, Backups Marketing Materials, and Other Made Prior to Data Migration Hardcopy Documents • Orphaned ESI (e.g. • Materials Stored On and/or departmental file shares) Offsite (e.g. Iron Mountain) • Inactive/Decommissioned • Documents in the Possession Servers of Third Parties • Retained Collections of Hard Drives, CDs or other Media • Data in the Possession of Third parties 5
  • 6. A Process for Addressing Legacy Data Iterative High-Level Risk-Focused Identify Disposition Understand Data Prepare Information Constraints Store(s) for Comparison - Retention Obligations - Origins - Preservation Matrix and - Statutory, Regulatory, - Date Ranges Materials Index Common Law Requirements - Formats - Similar Measures Allow - Contractual Requirements - Content Direct Comparison - Legal Hold Obligations - Custodian Disposition of Data Apply Risk Assessment (Reasonable Investigation) - Is Info Likely Relevant? - Is Info Likely Unique? - Duty to Preserve/Maintain? 6
  • 7. Remediation Framework/Considerations • 3 Key Considerations: Iterative, High Level, Risk Focused • General Tips – Work From Available Information; Infer Where Reasonable – Identify Best Value Approaches to Additional Investigation – Document Each Step • Identify Deletion/Destruction Constraints – Identify/Clarify Constraints at Issue Using Measurable Descriptors • Understand Data Stores – Origins, Date Ranges, Formats, Content, Custodian – Key Differences in Population – Breakdown Material into Groups – Additional Investigation: Sampling, Interviews, Database Mining • Prepare Information for Comparison – Constrains and Materials - Use Same/Similar Descriptors • Apply Risk Assessment to Identify Disposable Information 7
  • 8. Paper – A Real World Example Situation Process Resolution • Fortune 250 company with over 50K boxes of hard copy paper records eligible for disposition under the record schedule • Desire to dispose of material not subject to legal hold • Significant information available about the material in the boxes; less information available on open legal holds • Cost of assessment needed to be proportional to the cost of storing the material 8
  • 9. Paper – A Real World Example Situation Process Resolution • Validated information about the materials – Sampled boxes to confirm accuracy of indices – QC missing and suspect information (e.g., dates) • Gathered information regarding legal holds – Reviewed all open holds and used available matter reporting capabilities – Follow-up • Created “Preservation Matrix” – Consolidated holds into manageable number of categories – Each category had as broad a scope as the sum of the component holds – Primary considerations: Record Code, Date Range; Also Geography, Department, – Obtained case-team sign-off on hold scope assumptions – High quality of indices meant no need for equivalent categorization of material • Iterative, Risk-Based Assessment 9
  • 10. Paper – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of specific material – One third cleared at the first iteration (Record Code) – Another third cleared at the Record Code by date iteration – Final third held by a handful of cases requiring case-specific additional follow-up (collection, case team identification of relevant materials) • Other significant highlights: – Process from took longer than originally planned –the evolving hold environment (as cases open/close) complicated analysis – Outside counsel required some case-specific additional steps • Next time… – Identify critical cases (and most conservative attorneys) and involve those case teams much earlier in the process to prevent delays 10
  • 11. ESI – A Real World Example Situation Process Resolution • Global 500 company with over 60K legacy media items in one division • Mostly backup tapes – Varying tape types and backup mechanisms (including NDMP) • Media assumed to contain emails, user files, application data and other unknown content • Little to no inventory information available for a large subset of the media items • Desire to dispose of this information to reduce legal risk and storage costs 11
  • 12. ESI – A Real World Example Situation Process Resolution • Identified team members • Researched as much information as possible regarding media items and legal holds • Established sampling hypothesis – Materials on backup media were largely duplicative because legal hold custodians were preserving materials in active storage • Developed sampling strategy – Selected less than 50 (out of over 60K) media items to sample, targeting different date ranges and content (both email and file share backups) • Restored, indexed and then filtered data based on legal hold keywords • Reviewed for “responsiveness” and selected statistically valid set of emails and user files • Worked with custodians (and IT for former employees) to validate hypothesis 12
  • 13. ESI – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of media items • Proceeded with destruction/recycling of approximately 80% of legacy media items • Continued hold on the remaining media items • Other significant highlights: – Process from kick-off to recommendations took about 8 months — several months longer than originally planned – Had to be flexible and adjust plan as issues were encountered – End result was well-received within Legal and by IT – Considering different approach on subsequent projects to minimize vendor costs 13
  • 14. Other Real World Examples Examples? 14
  • 15. Additional Resources • www.redgravellp.com: – Webcasts: “What do you want your legacy to be?” – Link: Sedona Commentary on Inactive Information – Podcast Links: • Dealing with Legacy Data – What to do About ESI Messes Today • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools • Organizations: 15