SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
tently manipulated. Challenges to data

E-Discovery Technology                                                                                 authenticity can jeopardize the outcome of the
                                                                                                       litigation matter.
                                                                                                            If a professional service is needed,
                                                                                                       choose a company that has proven litiga-

Challenges and Solutions                                                                               tion support experience and that has per-
                                                                                                       sonnel whose experience and training can
                                                                                                       be verified. In many cases, those experts
                                                                                                       working on the case can be called upon by
                  By Ronald M. Godfrey, Computer Forensic Examiner, ITForensics.com                    the court to submit declarations detailing
                                                                                                       activities, and in some cases are required to
                                                                                                       provide oral testimony.
                                                                                                            Whether e-discovery is being done in-
                                                                                                       house or by a third party, having a wide
T  oday’s legal environment is very complex.
Attorneys are faced with myriad challenges to
                                                    the specific triggers identified as the cause of
                                                    the death. If an individual died as a result of
                                                                                                       breadth of technical experience is key as
                                                                                                       the e-discovery process unfolds. Having
effectively and efficiently support the digital     taking a certain medication, the attorney          the ability and tools available to collect
demands associated with a growing number of         might want to target the pharmaceutical com-       data from cell/smart phones, hard drives
cases. Many of these challenges are created by      pany’s servers and systems that contain com-       and servers, SharePoint websites, email
the rapidly advancing technologies in both the      munications or analysis relating to tests docu-    servers and local systems is critical.
corporate and social spheres. When the focus        menting the drug’s side effects.                        The last question to ask is what kinds of
is electronic discovery, the technologies that           Once the appropriate areas and nature of      software should be employed for doing e-
create these challenges have advanced faster        targeted data have been recognized, the next       discovery. There are many factors to con-
than the technology used to identify, collect and   question is how to process the information in      sider including: type of data that needs to
produce data. This creates stress, delays and       those relevant data stores. A good idea is to      be searched, locations and types of data
expense for all parties involved. However,          team with an information technology special-       stores, budgetary limitations, resources
these stresses can be minimized by doing some       ist, either in-house or through a third party.     available, the amount of data to be
simple pre-discovery planning. Considering                                                             processed and the time constraints.
questions like the ones below can narrow the
initial e-discovery scope and increase the
prospect of obtaining relevant data from the             “Electronic data is                           Taking Action
onset of a case.                                                                                           There are many tools on the markets and
                                                                                                       each should be considered based on the
                                                                                                       unique characters of your case. One of the
What You Should Know                                   no longer contained                             tools used by ITForensics is Sherpa
    The first question to ask when drafting an                                                         Software’s Discovery Attender. This software
e-discovery request is “where is the relevant                                                          is designed to assist the attorney or paralegal
data most likely to be stored for this case?”
Electronic data is no longer contained in a
                                                      in a centralized local                           in the management of data and information
                                                                                                       during the e-discovery collection process. DA
centralized local environment. It is mobile and                                                        is capable of searching mailboxes located on
global! Important information can be found                                                             the server, personal folders files (.PSTs) and
on local machines, networked servers, smart              environment. It is                            networked file shares or servers. Search
phones or even be hosted on the Internet. The                                                          results can be de-duplicated, thus reducing the
increased use of cloud computing adds even                                                             amount of data required to be reviewed and
further complexity to the process because
users can potentially access and manipulate
                                                       mobile and global!”                             stored. Other popular software tools include
                                                                                                       LAW, used for processing ESI data;
data via any Internet-connected device.                                                                Concordance, commonly used for reviewing;
    Identifying these data stores will help         Their expertise can be harnessed to effective-     and the Clearwell E-Discovery Platform, a
determine what type of process and tech-            ly outline how to best access the relevant elec-   well-known tool for its early case assessment
nology can be used to obtain the data. This,        tronically stored information. The specialist      features.
in turn, keeps the expenses and requests            can also advise the attorney on the complexi-          E-discovery can be a stressful and com-
reasonable without creating an undue bur-           ties in searching for the data and provide rec-    plicated process. Allocate time at the onset
den to the responsive party.                        ommendations how to best extract the data.         of the litigation case to identify relevant
    Another question to keep in mind is the         Having an idea of what type of data is relevant    data sources, data types, and who will col-
nature of the litigation and types of custodians    to the case, and where to look for the data is     lect the data in a professional manner. This
involved. This determines what kind of data         crucial to a successful litigation proceeding.     will reduce costs, improve efficiency and
could be responsive and where it is likely to           From this perspective, it is important to      benefit the litigation proceedings. Asking
reside. For example, responsive data for a          ask “do we have the expertise, resources           the right questions and utilizing the right
wrongful termination suit might reside in the       and tools to search and extract the data? Or,      technology and resources can further
email accounts of specific human resources          do we need a professional service?”                streamline the process and reduce stress
employees who were involved in the termina-             Probably one of the most important             along with time and expense. T
tion process. Documents relative to the spe-        aspects of collecting electronic evidence is
cific justification for the termination might                                                          Ron Godfrey is a digital forensics examiner at IT
                                                    validating authenticity. The data must be col-     Forensics, Inc. He teaches digital forensics at Highline
reside on a specific HR file share.                 lected in a manner that retains its original
    Another example could be a wrongful                                                                Community College in Des Moines, WA, and has worked
                                                    form. This makes having the right expertise        for a Fortune 100 company’s IT security department.
death case. It would be important to identify       important because inexperienced personnel          Godfrey has a total of 12 years in IT and IT security in the
data stores containing information related to       can increase the risk that data will be inadver-   corporate environment.


                                                                                                                     KMWorld February 2012                   S11

Weitere ähnliche Inhalte

Andere mochten auch

Historia de una maestra
Historia de una maestraHistoria de una maestra
Historia de una maestraEstherceta
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernaderodogffs86
 
Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Andre Golliez
 
Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012mpfcomunicacao
 
Febrero 11 y12
Febrero 11 y12Febrero 11 y12
Febrero 11 y12fbcat
 
Andy m's potw
Andy m's potwAndy m's potw
Andy m's potwssabatini
 
Projeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoProjeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoidarlete1953
 

Andere mochten auch (13)

Transacciones
TransaccionesTransacciones
Transacciones
 
Historia de una maestra
Historia de una maestraHistoria de una maestra
Historia de una maestra
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernadero
 
Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115Swiss data cloud_e_gov-symposium_20111115
Swiss data cloud_e_gov-symposium_20111115
 
Reflexion tecnologia
Reflexion tecnologiaReflexion tecnologia
Reflexion tecnologia
 
Page0082
Page0082Page0082
Page0082
 
Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012Instituto millenium brasil econômico 6_2_2012
Instituto millenium brasil econômico 6_2_2012
 
Feliz navidad
Feliz navidadFeliz navidad
Feliz navidad
 
Febrero 11 y12
Febrero 11 y12Febrero 11 y12
Febrero 11 y12
 
Andy m's potw
Andy m's potwAndy m's potw
Andy m's potw
 
Projeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete prontoProjeto de inclusão digital idarlete pronto
Projeto de inclusão digital idarlete pronto
 
Fração geratriz
Fração geratrizFração geratriz
Fração geratriz
 
Animes
AnimesAnimes
Animes
 

Mehr von Sherpa Software

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information GovernanceSherpa Software
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media Sherpa Software
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildSherpa Software
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationSherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

Mehr von Sherpa Software (15)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Kürzlich hochgeladen

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

E-Discovery Technology Challenges and Solutions

  • 1. tently manipulated. Challenges to data E-Discovery Technology authenticity can jeopardize the outcome of the litigation matter. If a professional service is needed, choose a company that has proven litiga- Challenges and Solutions tion support experience and that has per- sonnel whose experience and training can be verified. In many cases, those experts working on the case can be called upon by By Ronald M. Godfrey, Computer Forensic Examiner, ITForensics.com the court to submit declarations detailing activities, and in some cases are required to provide oral testimony. Whether e-discovery is being done in- house or by a third party, having a wide T oday’s legal environment is very complex. Attorneys are faced with myriad challenges to the specific triggers identified as the cause of the death. If an individual died as a result of breadth of technical experience is key as the e-discovery process unfolds. Having effectively and efficiently support the digital taking a certain medication, the attorney the ability and tools available to collect demands associated with a growing number of might want to target the pharmaceutical com- data from cell/smart phones, hard drives cases. Many of these challenges are created by pany’s servers and systems that contain com- and servers, SharePoint websites, email the rapidly advancing technologies in both the munications or analysis relating to tests docu- servers and local systems is critical. corporate and social spheres. When the focus menting the drug’s side effects. The last question to ask is what kinds of is electronic discovery, the technologies that Once the appropriate areas and nature of software should be employed for doing e- create these challenges have advanced faster targeted data have been recognized, the next discovery. There are many factors to con- than the technology used to identify, collect and question is how to process the information in sider including: type of data that needs to produce data. This creates stress, delays and those relevant data stores. A good idea is to be searched, locations and types of data expense for all parties involved. However, team with an information technology special- stores, budgetary limitations, resources these stresses can be minimized by doing some ist, either in-house or through a third party. available, the amount of data to be simple pre-discovery planning. Considering processed and the time constraints. questions like the ones below can narrow the initial e-discovery scope and increase the prospect of obtaining relevant data from the “Electronic data is Taking Action onset of a case. There are many tools on the markets and each should be considered based on the unique characters of your case. One of the What You Should Know no longer contained tools used by ITForensics is Sherpa The first question to ask when drafting an Software’s Discovery Attender. This software e-discovery request is “where is the relevant is designed to assist the attorney or paralegal data most likely to be stored for this case?” Electronic data is no longer contained in a in a centralized local in the management of data and information during the e-discovery collection process. DA centralized local environment. It is mobile and is capable of searching mailboxes located on global! Important information can be found the server, personal folders files (.PSTs) and on local machines, networked servers, smart environment. It is networked file shares or servers. Search phones or even be hosted on the Internet. The results can be de-duplicated, thus reducing the increased use of cloud computing adds even amount of data required to be reviewed and further complexity to the process because users can potentially access and manipulate mobile and global!” stored. Other popular software tools include LAW, used for processing ESI data; data via any Internet-connected device. Concordance, commonly used for reviewing; Identifying these data stores will help Their expertise can be harnessed to effective- and the Clearwell E-Discovery Platform, a determine what type of process and tech- ly outline how to best access the relevant elec- well-known tool for its early case assessment nology can be used to obtain the data. This, tronically stored information. The specialist features. in turn, keeps the expenses and requests can also advise the attorney on the complexi- E-discovery can be a stressful and com- reasonable without creating an undue bur- ties in searching for the data and provide rec- plicated process. Allocate time at the onset den to the responsive party. ommendations how to best extract the data. of the litigation case to identify relevant Another question to keep in mind is the Having an idea of what type of data is relevant data sources, data types, and who will col- nature of the litigation and types of custodians to the case, and where to look for the data is lect the data in a professional manner. This involved. This determines what kind of data crucial to a successful litigation proceeding. will reduce costs, improve efficiency and could be responsive and where it is likely to From this perspective, it is important to benefit the litigation proceedings. Asking reside. For example, responsive data for a ask “do we have the expertise, resources the right questions and utilizing the right wrongful termination suit might reside in the and tools to search and extract the data? Or, technology and resources can further email accounts of specific human resources do we need a professional service?” streamline the process and reduce stress employees who were involved in the termina- Probably one of the most important along with time and expense. T tion process. Documents relative to the spe- aspects of collecting electronic evidence is cific justification for the termination might Ron Godfrey is a digital forensics examiner at IT validating authenticity. The data must be col- Forensics, Inc. He teaches digital forensics at Highline reside on a specific HR file share. lected in a manner that retains its original Another example could be a wrongful Community College in Des Moines, WA, and has worked form. This makes having the right expertise for a Fortune 100 company’s IT security department. death case. It would be important to identify important because inexperienced personnel Godfrey has a total of 12 years in IT and IT security in the data stores containing information related to can increase the risk that data will be inadver- corporate environment. KMWorld February 2012 S11