SlideShare une entreprise Scribd logo
1  sur  8
eDiscovery without the headaches Policies, Processes and People
Covering the EDRM 11/24/2009 2
eDiscovery Readiness Network Mapping Data Mapping Policy Procedure Protocol Education To do IM/RM Tools Team Protocol Education Experts Technology 3 11/24/2009 3
Identification 11/24/2009 4 Scoping Search Capacity Network Analysis Technology Analysis Network Crawling Strategy
Preservation Onsite Collection Hold Protocol and Process Relevance Metadata Hold Release 11/24/2009 5
Collection Remotely Onsite Forensic Imaging Logical collection Manual Copy Protocol and Education Chain of custody Hosting 11/24/2009 6
Processing DeNISTing Metadata Extraction Filtering Triage Deduplication Near-Deduplication Searching Keyword Concept Relation Clustering Compatible load files 11/24/2009 7
Questions? Dominic Jaar djaar@ledjit.com514.212.9348www.ledjit.com

Contenu connexe

Tendances

Nordic Tryggve project
Nordic Tryggve projectNordic Tryggve project
Nordic Tryggve projectanttipursula
 
The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008Alastair Dunning
 
Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...Michael Day
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital PreservationBen Fino-radin
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallJ. David Morris
 
Data sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataData sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataEOSC-hub project
 

Tendances (7)

Nordic Tryggve project
Nordic Tryggve projectNordic Tryggve project
Nordic Tryggve project
 
The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008
 
Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital Preservation
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Data sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataData sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” data
 

En vedette

Numérisation de substitution
Numérisation de substitutionNumérisation de substitution
Numérisation de substitutionLedjit
 
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...Ledjit
 
The radio shack court
The radio shack courtThe radio shack court
The radio shack courtLedjit
 
Rixe sur la preuve électronique
Rixe sur la preuve électroniqueRixe sur la preuve électronique
Rixe sur la preuve électroniqueLedjit
 
CEIC 2010 international panel
CEIC 2010 international panelCEIC 2010 international panel
CEIC 2010 international panelLedjit
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
 

En vedette (7)

Numérisation de substitution
Numérisation de substitutionNumérisation de substitution
Numérisation de substitution
 
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
 
The radio shack court
The radio shack courtThe radio shack court
The radio shack court
 
Rixe sur la preuve électronique
Rixe sur la preuve électroniqueRixe sur la preuve électronique
Rixe sur la preuve électronique
 
CEIC 2010 international panel
CEIC 2010 international panelCEIC 2010 international panel
CEIC 2010 international panel
 
The ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth ReviewThe ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth Review
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
 

Similaire à eDiscovery without the headaches

EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsEMC
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Research Data Management Implementations
Research Data Management Implementations Research Data Management Implementations
Research Data Management Implementations Globus
 
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docxComputer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docxmaxinesmith73660
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Comparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation EducationComparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation EducationJeffrey Pomerantz, Ph.D.
 
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...Keith Atteck C.Tech. ERMm
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest LectureMurthinty
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management Gary Wilhelm
 
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method IJECEIAES
 

Similaire à eDiscovery without the headaches (20)

EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Research Data Management Implementations
Research Data Management Implementations Research Data Management Implementations
Research Data Management Implementations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docxComputer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Comparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation EducationComparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation Education
 
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
 

Plus de Ledjit

Le web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaireLe web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaireLedjit
 
Une nouvelle administration de la preuve
Une nouvelle administration de la preuveUne nouvelle administration de la preuve
Une nouvelle administration de la preuveLedjit
 
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...Ledjit
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Ledjit
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsLedjit
 
Documents and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s PerspectiveDocuments and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s PerspectiveLedjit
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic MethodologiesLedjit
 
Preuve électronique + Procédure
Preuve électronique + ProcédurePreuve électronique + Procédure
Preuve électronique + ProcédureLedjit
 
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...Ledjit
 
60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutes60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutesLedjit
 
The Portable Courtroom
The Portable CourtroomThe Portable Courtroom
The Portable CourtroomLedjit
 
Salle d'audience portable
Salle d'audience portableSalle d'audience portable
Salle d'audience portableLedjit
 
Production of Documents, Technology and Costs
Production of Documents, Technology and CostsProduction of Documents, Technology and Costs
Production of Documents, Technology and CostsLedjit
 
Le Web2
Le Web2Le Web2
Le Web2Ledjit
 
L'administration de la preuve électronique
L'administration de la preuve électroniqueL'administration de la preuve électronique
L'administration de la preuve électroniqueLedjit
 
Présentation de la preuve électronique
Présentation de la preuve électroniquePrésentation de la preuve électronique
Présentation de la preuve électroniqueLedjit
 
Rédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'informationRédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'informationLedjit
 
Révision et analyse des documents
Révision et analyse des documentsRévision et analyse des documents
Révision et analyse des documentsLedjit
 
L'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAPL'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAPLedjit
 
L'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespaceL'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespaceLedjit
 

Plus de Ledjit (20)

Le web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaireLe web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaire
 
Une nouvelle administration de la preuve
Une nouvelle administration de la preuveUne nouvelle administration de la preuve
Une nouvelle administration de la preuve
 
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and Solutions
 
Documents and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s PerspectiveDocuments and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s Perspective
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
Preuve électronique + Procédure
Preuve électronique + ProcédurePreuve électronique + Procédure
Preuve électronique + Procédure
 
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
 
60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutes60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutes
 
The Portable Courtroom
The Portable CourtroomThe Portable Courtroom
The Portable Courtroom
 
Salle d'audience portable
Salle d'audience portableSalle d'audience portable
Salle d'audience portable
 
Production of Documents, Technology and Costs
Production of Documents, Technology and CostsProduction of Documents, Technology and Costs
Production of Documents, Technology and Costs
 
Le Web2
Le Web2Le Web2
Le Web2
 
L'administration de la preuve électronique
L'administration de la preuve électroniqueL'administration de la preuve électronique
L'administration de la preuve électronique
 
Présentation de la preuve électronique
Présentation de la preuve électroniquePrésentation de la preuve électronique
Présentation de la preuve électronique
 
Rédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'informationRédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'information
 
Révision et analyse des documents
Révision et analyse des documentsRévision et analyse des documents
Révision et analyse des documents
 
L'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAPL'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAP
 
L'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespaceL'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespace
 

eDiscovery without the headaches