SlideShare une entreprise Scribd logo
1  sur  8
1© Copyright 2010 EMC Corporation. All rights reserved.
ARMA International's 55th
Conference & Expo
“eDiscovery Behind the Firewall”
EMC SourceOne
eDiscovery – Kazeon
J. David Morris - November 2010
2© Copyright 2010 EMC Corporation. All rights reserved.
Sources
Format
Electronic Content
Cross-borderSpeed
Volume
Information by 2020: The Big Picture
3© Copyright 2010 EMC Corporation. All rights reserved.
10x
increased costs
to outsource
$1.5M
average cost
per incident
$34M
average annual
legal costs
89%
of companies
face litigation
$18M+
cost to review
1 TB of info
The eDiscovery Cost
Factoid: The average Fortune 500 company has 147 concurrent lawsuits. Gartner
4© Copyright 2010 EMC Corporation. All rights reserved.
Traditional eDiscovery
Original ESI Duplicate copy of ESI Sent to Outside
Counsel for
Review
Agent
s
5© Copyright 2010 EMC Corporation. All rights reserved.
SourceOne’s value proposition
Integrated ESI
Sources
E-mail Systems
Microsoft Exchange
Domino/Lotus Notes
PST/NSF personal archives
File Systems
Desktops
Laptops
CIFS/NFS File shares
Content Management
& Collaboration
Systems
EMC Documentum
Microsoft SharePoint
Symantec Enterprise Vault
Early
Case
Assessment:
Extensive analysis,
searching and
first-pass review
for enterprise-wide
data resulting in
quick yet
comprehensive
assessment of
case.
6© Copyright 2010 EMC Corporation. All rights reserved.
Desktops, Remote Offices,
and Laptops
Custodian ESI
Target
Legal Hold
Legal Hold or
Legal Store or
Preservation
Store
Collect
Copy/Move
Legal Store
In-place
Legal HoldE-mail
Servers
File
Shares Backup
Archives
E-mail
Archives
Document
Repositories
Platform within the Firewall
ESI
Identification &
Collection SourceOne
Records Manager
Celerra or
Centera
with FLR
Documentum
with Records
Management
eDiscovery Behind the Firewall
InternetInternet
Outside Counsel
Review via VPN
7© Copyright 2010 EMC Corporation. All rights reserved.
eDiscovery Behind the Firewall: Top Five Reasons
1. Gain insight into Corporate ESI
• What do we have?
• What do we do with it?
• How to create policies and procedures to handle differing Info types?
2. Gain control of what and how much ESI leaves the corporation
• Data Leakage
• Risk Mitigation – Privileged, Confidential, Relevant and Non-Relevant
• Increase time to data
• Reduce dependence on or reduce Third party review costs
• Implement Legal Hold
3. Gain understanding of Risk and create Legal Strategy for a specific Litigation
• Who knew what when….
• Is there a “Smoking Gun” or ESI Vindication document
4. Increase responsiveness and capabilities to reduce frivolous law suits
• Stop procedural focused cases
• Reduce time to solution
5. Reduce litigation cost
• Identification, PreCulling, Collection, Analysis, Review, and Production
• Attorney and outside counsel time investment
8© Copyright 2010 EMC Corporation. All rights reserved.
THANK YOU
david.morris@emc.com

Contenu connexe

Tendances

FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
salehnia
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
burto111
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Tania Mushtaq
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 

Tendances (20)

Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
Vulnerability Assessment Scenarios
Vulnerability Assessment ScenariosVulnerability Assessment Scenarios
Vulnerability Assessment Scenarios
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 

Similaire à ARMA - eDiscovery Behind the Firewall

NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
J. David Morris
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
J. David Morris
 
Data Minimization.Defensible Culling Techniques 04.03.09
Data Minimization.Defensible Culling Techniques 04.03.09Data Minimization.Defensible Culling Techniques 04.03.09
Data Minimization.Defensible Culling Techniques 04.03.09
knugent
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Dan Michaluk
 

Similaire à ARMA - eDiscovery Behind the Firewall (20)

Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
eDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. ITeDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. IT
 
Apps Preso
Apps PresoApps Preso
Apps Preso
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
 
File000166
File000166File000166
File000166
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Data Minimization.Defensible Culling Techniques 04.03.09
Data Minimization.Defensible Culling Techniques 04.03.09Data Minimization.Defensible Culling Techniques 04.03.09
Data Minimization.Defensible Culling Techniques 04.03.09
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 

Plus de J. David Morris

IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
J. David Morris
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011
J. David Morris
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 F
J. David Morris
 

Plus de J. David Morris (20)

Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer Experience
 
Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinar
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big Answers
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive Analytics
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
eDiscovery Infographic
eDiscovery InfographiceDiscovery Infographic
eDiscovery Infographic
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscovery
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscovery
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 
Pardon the eDiscovery
Pardon the eDiscoveryPardon the eDiscovery
Pardon the eDiscovery
 
EMC SourceOne for SharePoint
EMC SourceOne for SharePointEMC SourceOne for SharePoint
EMC SourceOne for SharePoint
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 F
 
Webinar Win In Court V3
Webinar Win In Court V3Webinar Win In Court V3
Webinar Win In Court V3
 

ARMA - eDiscovery Behind the Firewall

  • 1. 1© Copyright 2010 EMC Corporation. All rights reserved. ARMA International's 55th Conference & Expo “eDiscovery Behind the Firewall” EMC SourceOne eDiscovery – Kazeon J. David Morris - November 2010
  • 2. 2© Copyright 2010 EMC Corporation. All rights reserved. Sources Format Electronic Content Cross-borderSpeed Volume Information by 2020: The Big Picture
  • 3. 3© Copyright 2010 EMC Corporation. All rights reserved. 10x increased costs to outsource $1.5M average cost per incident $34M average annual legal costs 89% of companies face litigation $18M+ cost to review 1 TB of info The eDiscovery Cost Factoid: The average Fortune 500 company has 147 concurrent lawsuits. Gartner
  • 4. 4© Copyright 2010 EMC Corporation. All rights reserved. Traditional eDiscovery Original ESI Duplicate copy of ESI Sent to Outside Counsel for Review Agent s
  • 5. 5© Copyright 2010 EMC Corporation. All rights reserved. SourceOne’s value proposition Integrated ESI Sources E-mail Systems Microsoft Exchange Domino/Lotus Notes PST/NSF personal archives File Systems Desktops Laptops CIFS/NFS File shares Content Management & Collaboration Systems EMC Documentum Microsoft SharePoint Symantec Enterprise Vault Early Case Assessment: Extensive analysis, searching and first-pass review for enterprise-wide data resulting in quick yet comprehensive assessment of case.
  • 6. 6© Copyright 2010 EMC Corporation. All rights reserved. Desktops, Remote Offices, and Laptops Custodian ESI Target Legal Hold Legal Hold or Legal Store or Preservation Store Collect Copy/Move Legal Store In-place Legal HoldE-mail Servers File Shares Backup Archives E-mail Archives Document Repositories Platform within the Firewall ESI Identification & Collection SourceOne Records Manager Celerra or Centera with FLR Documentum with Records Management eDiscovery Behind the Firewall InternetInternet Outside Counsel Review via VPN
  • 7. 7© Copyright 2010 EMC Corporation. All rights reserved. eDiscovery Behind the Firewall: Top Five Reasons 1. Gain insight into Corporate ESI • What do we have? • What do we do with it? • How to create policies and procedures to handle differing Info types? 2. Gain control of what and how much ESI leaves the corporation • Data Leakage • Risk Mitigation – Privileged, Confidential, Relevant and Non-Relevant • Increase time to data • Reduce dependence on or reduce Third party review costs • Implement Legal Hold 3. Gain understanding of Risk and create Legal Strategy for a specific Litigation • Who knew what when…. • Is there a “Smoking Gun” or ESI Vindication document 4. Increase responsiveness and capabilities to reduce frivolous law suits • Stop procedural focused cases • Reduce time to solution 5. Reduce litigation cost • Identification, PreCulling, Collection, Analysis, Review, and Production • Attorney and outside counsel time investment
  • 8. 8© Copyright 2010 EMC Corporation. All rights reserved. THANK YOU david.morris@emc.com