Contenu connexe Similaire à ARMA - eDiscovery Behind the Firewall (20) Plus de J. David Morris (20) ARMA - eDiscovery Behind the Firewall1. 1© Copyright 2010 EMC Corporation. All rights reserved.
ARMA International's 55th
Conference & Expo
“eDiscovery Behind the Firewall”
EMC SourceOne
eDiscovery – Kazeon
J. David Morris - November 2010
2. 2© Copyright 2010 EMC Corporation. All rights reserved.
Sources
Format
Electronic Content
Cross-borderSpeed
Volume
Information by 2020: The Big Picture
3. 3© Copyright 2010 EMC Corporation. All rights reserved.
10x
increased costs
to outsource
$1.5M
average cost
per incident
$34M
average annual
legal costs
89%
of companies
face litigation
$18M+
cost to review
1 TB of info
The eDiscovery Cost
Factoid: The average Fortune 500 company has 147 concurrent lawsuits. Gartner
4. 4© Copyright 2010 EMC Corporation. All rights reserved.
Traditional eDiscovery
Original ESI Duplicate copy of ESI Sent to Outside
Counsel for
Review
Agent
s
5. 5© Copyright 2010 EMC Corporation. All rights reserved.
SourceOne’s value proposition
Integrated ESI
Sources
E-mail Systems
Microsoft Exchange
Domino/Lotus Notes
PST/NSF personal archives
File Systems
Desktops
Laptops
CIFS/NFS File shares
Content Management
& Collaboration
Systems
EMC Documentum
Microsoft SharePoint
Symantec Enterprise Vault
Early
Case
Assessment:
Extensive analysis,
searching and
first-pass review
for enterprise-wide
data resulting in
quick yet
comprehensive
assessment of
case.
6. 6© Copyright 2010 EMC Corporation. All rights reserved.
Desktops, Remote Offices,
and Laptops
Custodian ESI
Target
Legal Hold
Legal Hold or
Legal Store or
Preservation
Store
Collect
Copy/Move
Legal Store
In-place
Legal HoldE-mail
Servers
File
Shares Backup
Archives
E-mail
Archives
Document
Repositories
Platform within the Firewall
ESI
Identification &
Collection SourceOne
Records Manager
Celerra or
Centera
with FLR
Documentum
with Records
Management
eDiscovery Behind the Firewall
InternetInternet
Outside Counsel
Review via VPN
7. 7© Copyright 2010 EMC Corporation. All rights reserved.
eDiscovery Behind the Firewall: Top Five Reasons
1. Gain insight into Corporate ESI
• What do we have?
• What do we do with it?
• How to create policies and procedures to handle differing Info types?
2. Gain control of what and how much ESI leaves the corporation
• Data Leakage
• Risk Mitigation – Privileged, Confidential, Relevant and Non-Relevant
• Increase time to data
• Reduce dependence on or reduce Third party review costs
• Implement Legal Hold
3. Gain understanding of Risk and create Legal Strategy for a specific Litigation
• Who knew what when….
• Is there a “Smoking Gun” or ESI Vindication document
4. Increase responsiveness and capabilities to reduce frivolous law suits
• Stop procedural focused cases
• Reduce time to solution
5. Reduce litigation cost
• Identification, PreCulling, Collection, Analysis, Review, and Production
• Attorney and outside counsel time investment
8. 8© Copyright 2010 EMC Corporation. All rights reserved.
THANK YOU
david.morris@emc.com