SlideShare a Scribd company logo
1 of 17
Lotus Notes eDiscovery: Common Defensibility Pitfalls of Processing
Processing: eDiscovery Challenges Description:  Many eDiscovery applications do not handle Lotus Notes email natively. Unfortunately, conversion tools often times leave behind critical metadata that can strike at the heart of a matter.  Real world examples of Notes conversions gone wrong Methods to guard your data during the conversion process Best practices when using technologies that handle Lotus Notes natively Alternative solution when conversion is not an option Panelists Info:  Matt Markham – Director of Solutions Engineering, Daegis Kevin Savage – National Director of Operations, Daegis 2
Agenda Domino / Lotus Notes platform How to deal with the data Application classification Best practices Q&A 3
Data Proliferation & Info Management 	The Domino Platform keeps growing! Originally built as a generic internal messaging and application platform Now includes things like calendaring and thousands of purpose built and custom applications Useful data from a litigation standpoint now exists in places beyond email Application data Calendar data Document libraries Legacy data is everywhere as Notes/Domino has been around since the early 1990’s 4
Information Management & Lotus Notes 	Lotus Notes Email Email is an application built on the Lotus Domino Platform Lotus Notes databases are being used as de facto filing cabinets because they can hold almost anything Unlike other platforms, enormous Lotus Notes databases are not uncommon – much larger than other platforms 5
How do you deal with data? 	Spread data to other Notes databases Users often have “personal” archives on local or network drives This was often done to deal with poor performance on server mailbox 	Employ quotas on server side mail files Keeps storage costs lower on Domino servers Keeps performance better on Domino servers Forces users to have “personal” archives on their own machines or network drives 6
How do you deal with data? 	Data policies and Retention Recent versions of Domino/Notes allow: Data can be moved to archive databases automatically based on things like age and size Data can be moved to external repositories automatically based on things like age and size Data can also be deleted from databases (archive or otherwise) automatically based on things like age This still means lots of Domino databases everywhere Centralized archives are increasingly being employed Easier enforcement of retention and legal holds Centralized search 7
Application Classification 8 Data Centric  Process Centric  ,[object Object]
Connections to other systems
Trigger events, workflow
Notes as a front-end
Value is the Data
Notes is just a container
Store, search, edit, sort, view … ,[object Object]
Known Data fields and function
Variables, code, and, UI is known
Created for a particular need

More Related Content

What's hot

Lecture 01
Lecture 01Lecture 01
Lecture 01johar7
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processingUMaine
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing conceptskinjal patel
 
Litereture review of inventory system
Litereture review of inventory systemLitereture review of inventory system
Litereture review of inventory systemjrang
 
Document Management System(DMS)
Document Management System(DMS)Document Management System(DMS)
Document Management System(DMS)Nishant Shah
 
LVA Electronic Records Management
LVA Electronic Records ManagementLVA Electronic Records Management
LVA Electronic Records ManagementPaul Neal
 
Database Systems - Introduction to Database Design (Chapter 4/1)
Database Systems - Introduction to Database Design (Chapter 4/1)Database Systems - Introduction to Database Design (Chapter 4/1)
Database Systems - Introduction to Database Design (Chapter 4/1)Vidyasagar Mundroy
 
Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01Md.Abu Sayed
 
Bitkom cebit dope your business en
Bitkom cebit dope your business   enBitkom cebit dope your business   en
Bitkom cebit dope your business enjochenmaier
 
Database management systems cs403 power point slides lecture 04
Database management systems   cs403 power point slides lecture 04Database management systems   cs403 power point slides lecture 04
Database management systems cs403 power point slides lecture 04Md.Abu Sayed
 
Integrating Share Point With Your Ecm Erm Application
Integrating Share Point With Your Ecm Erm ApplicationIntegrating Share Point With Your Ecm Erm Application
Integrating Share Point With Your Ecm Erm ApplicationRuss Stalters
 
Ch 2 D B Dvlpt Process
Ch 2  D B  Dvlpt  ProcessCh 2  D B  Dvlpt  Process
Ch 2 D B Dvlpt Processguest8fdbdd
 

What's hot (18)

Lecture 01
Lecture 01Lecture 01
Lecture 01
 
01 chapter
01 chapter01 chapter
01 chapter
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processing
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing concepts
 
Litereture review of inventory system
Litereture review of inventory systemLitereture review of inventory system
Litereture review of inventory system
 
Web Development
Web Development  Web Development
Web Development
 
Document Management System(DMS)
Document Management System(DMS)Document Management System(DMS)
Document Management System(DMS)
 
DMS and FMS
DMS and FMSDMS and FMS
DMS and FMS
 
LVA Electronic Records Management
LVA Electronic Records ManagementLVA Electronic Records Management
LVA Electronic Records Management
 
Database Systems - Introduction to Database Design (Chapter 4/1)
Database Systems - Introduction to Database Design (Chapter 4/1)Database Systems - Introduction to Database Design (Chapter 4/1)
Database Systems - Introduction to Database Design (Chapter 4/1)
 
Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01
 
Database part1-
Database part1-Database part1-
Database part1-
 
Bitkom cebit dope your business en
Bitkom cebit dope your business   enBitkom cebit dope your business   en
Bitkom cebit dope your business en
 
Database management systems cs403 power point slides lecture 04
Database management systems   cs403 power point slides lecture 04Database management systems   cs403 power point slides lecture 04
Database management systems cs403 power point slides lecture 04
 
Integrating Share Point With Your Ecm Erm Application
Integrating Share Point With Your Ecm Erm ApplicationIntegrating Share Point With Your Ecm Erm Application
Integrating Share Point With Your Ecm Erm Application
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
 
Ch 2 D B Dvlpt Process
Ch 2  D B  Dvlpt  ProcessCh 2  D B  Dvlpt  Process
Ch 2 D B Dvlpt Process
 
Document Management System
Document Management System Document Management System
Document Management System
 

Similar to eDiscovery Challenges of Processing Lotus Notes Data

BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT panagenda
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITDaniel Reimann
 
DBMS Lec 1 & 2.ppt
DBMS Lec 1 & 2.pptDBMS Lec 1 & 2.ppt
DBMS Lec 1 & 2.pptMariaEmaan1
 
Eleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingEleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingStephen Foskett
 
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?SWING Software
 
Hand Coding ETL Scenarios and Challenges
Hand Coding ETL Scenarios and ChallengesHand Coding ETL Scenarios and Challenges
Hand Coding ETL Scenarios and Challengesmark madsen
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptLisaMalar
 
Microsoft SharePoint and the Future of ECM
Microsoft SharePoint and the Future of ECMMicrosoft SharePoint and the Future of ECM
Microsoft SharePoint and the Future of ECMGreg Clark
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1Chris Sparshott
 
Big data analytic platform
Big data analytic platformBig data analytic platform
Big data analytic platformJesse Wang
 
Data Science Process.pptx
Data Science Process.pptxData Science Process.pptx
Data Science Process.pptxWidsoulDevil
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeChristoph Adler
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo
 
Lotus Notes Basics
Lotus Notes BasicsLotus Notes Basics
Lotus Notes BasicsNeo Neo
 
training-lotus
training-lotustraining-lotus
training-lotusNeo Neo
 

Similar to eDiscovery Challenges of Processing Lotus Notes Data (20)

ms-11.pdf
ms-11.pdfms-11.pdf
ms-11.pdf
 
BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise IT
 
New IM ToolBelt
New IM ToolBeltNew IM ToolBelt
New IM ToolBelt
 
DBMS Lec 1 & 2.ppt
DBMS Lec 1 & 2.pptDBMS Lec 1 & 2.ppt
DBMS Lec 1 & 2.ppt
 
Eleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingEleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email Archiving
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?
 
Hand Coding ETL Scenarios and Challenges
Hand Coding ETL Scenarios and ChallengesHand Coding ETL Scenarios and Challenges
Hand Coding ETL Scenarios and Challenges
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.ppt
 
Microsoft SharePoint and the Future of ECM
Microsoft SharePoint and the Future of ECMMicrosoft SharePoint and the Future of ECM
Microsoft SharePoint and the Future of ECM
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1
 
DB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptxDB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptx
 
Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
 
Big data analytic platform
Big data analytic platformBig data analytic platform
Big data analytic platform
 
Data Science Process.pptx
Data Science Process.pptxData Science Process.pptx
Data Science Process.pptx
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
 
Lotus Notes Basics
Lotus Notes BasicsLotus Notes Basics
Lotus Notes Basics
 
training-lotus
training-lotustraining-lotus
training-lotus
 

More from Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITDaegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to AvoidDaegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & ArchivingDaegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted ArchiveDaegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDaegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best DefenseDaegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewDaegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery ProcessDaegis
 

More from Daegis (11)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

eDiscovery Challenges of Processing Lotus Notes Data

  • 1. Lotus Notes eDiscovery: Common Defensibility Pitfalls of Processing
  • 2. Processing: eDiscovery Challenges Description: Many eDiscovery applications do not handle Lotus Notes email natively. Unfortunately, conversion tools often times leave behind critical metadata that can strike at the heart of a matter. Real world examples of Notes conversions gone wrong Methods to guard your data during the conversion process Best practices when using technologies that handle Lotus Notes natively Alternative solution when conversion is not an option Panelists Info: Matt Markham – Director of Solutions Engineering, Daegis Kevin Savage – National Director of Operations, Daegis 2
  • 3. Agenda Domino / Lotus Notes platform How to deal with the data Application classification Best practices Q&A 3
  • 4. Data Proliferation & Info Management The Domino Platform keeps growing! Originally built as a generic internal messaging and application platform Now includes things like calendaring and thousands of purpose built and custom applications Useful data from a litigation standpoint now exists in places beyond email Application data Calendar data Document libraries Legacy data is everywhere as Notes/Domino has been around since the early 1990’s 4
  • 5. Information Management & Lotus Notes Lotus Notes Email Email is an application built on the Lotus Domino Platform Lotus Notes databases are being used as de facto filing cabinets because they can hold almost anything Unlike other platforms, enormous Lotus Notes databases are not uncommon – much larger than other platforms 5
  • 6. How do you deal with data? Spread data to other Notes databases Users often have “personal” archives on local or network drives This was often done to deal with poor performance on server mailbox Employ quotas on server side mail files Keeps storage costs lower on Domino servers Keeps performance better on Domino servers Forces users to have “personal” archives on their own machines or network drives 6
  • 7. How do you deal with data? Data policies and Retention Recent versions of Domino/Notes allow: Data can be moved to archive databases automatically based on things like age and size Data can be moved to external repositories automatically based on things like age and size Data can also be deleted from databases (archive or otherwise) automatically based on things like age This still means lots of Domino databases everywhere Centralized archives are increasingly being employed Easier enforcement of retention and legal holds Centralized search 7
  • 8.
  • 11. Notes as a front-end
  • 13. Notes is just a container
  • 14.
  • 15. Known Data fields and function
  • 16. Variables, code, and, UI is known
  • 17. Created for a particular need
  • 18. Unknown Data fields and function
  • 19. Variables, code, and, UI is unknownCustom Design (Unknown)
  • 20.
  • 27. Names
  • 28.
  • 34.
  • 40. Surveys4 3 Custom Applications
  • 41. Processing: eDiscovery Challenges Why can Lotus Notes data be a challenge to process? Many different intended uses exist in Lotus - Email may be present. Team discussion applications, document libraries, document management databases and many other application types can also be present. Lotus Notes is a very flexible application. Understanding the applications in your data collection is essential to processing the data properly. 11
  • 42. Best Practices for Processing Lotus Notes Common Question – How does this differ from any other data type such as Outlook/Exchange? Consider how eDiscovery tools basically extract & index data Fields / Components successfully mapped ! 12
  • 43. Best Practices for Processing Lotus Notes How would that same tool deal with processing a customized Lotus Notes database if fed through a similar process? Missed fields ! 13
  • 44. Best Practices: Technology Avoid technology that relies on Lotus e-mail conversion to other formats such as Outlook Risks associated of this process: Loss of metadata / text Loss of attachments / embedded objects Loss of duplicate identification Loss of records The exception to this rule is when a fully validated, error trapping conversion can be performed Make sure that your results are inclusive of all of your source data components. This will assure that the context is maintained in your eDiscovery database 14
  • 45.
  • 46.
  • 47. Thank You! Please visit www.daegis.com for more eDiscovery resources.