This document discusses how work communications have evolved beyond just email servers and laptops to include text, instant messaging, and mobile sharing apps. It raises questions about where company data is stored and how it is managed, including on which devices, how ex-employee data is handled, and how existing software addresses data privacy and compliance policies. The document promotes Druva software, stating it allows companies to collect 100% of data from mobile devices, and provides legal and IT professionals tools to facilitate discovery of electronic communications data from a variety of sources and ensure its admissibility if needed.
AWS Community Day CPH - Three problems of Terraform
Getting a clue: uncovering the truth about your data with mobile forensics
1. Six years ago, I.T.’s main source of truth when it came
to legal and compliance rested in email servers. These
days, work communications have evolved and are not
limited to just laptops. They have burst on the scene
with text, instant messaging, and mobile sharing apps.
Where is your data going? Where is it stored?
• Where is the backed-up data stored?
• What are our retention and archival policies?
• How is the company currently backing up the data stored on
laptops, desktops and mobile devices (a.k.a. endpoints)?
• Which devices — Windows, Mac, iOS, Android, Linux, etc. —
are in use?
• How do we manage data belonging to ex-employees?
• How does our existing software handle and implement
data privacy and confidentiality policies?
• Can we collect and preserve deleted messages?
• How can I monitor messaging communications on
mobile devices for adherence to regulatory
mandates or internal compliance policies?
• Give Legal information about the company’s
data assets
• Educate Legal on all the software I.T. uses to
manage data
• Look for opportunities for I.T. to identify and collect
data that can facilitate repeatable collections and
reduce spoilage risk
• Involve Legal early in the process while evaluating
data-protection software that enables eDiscovery
• Enable access to advanced audit capabilities that ensures
full chain of custody
• Choose software that helps Legal do its own data retrieval
Druva is the only company in the data protection space that
enables companies to grab 100% of data off mobile devices.
Learn more at
- Gibson Dunn, “2015 Mid-Year E-Discovery Update”,
http://www.gibsondunn.com/publications/Pages/2015-Mid-Year-E-Discovery-Update.aspx
- RingCentral, “Big changes in business communications”,
https://blog.ringcentral.com/2013/03/infographic-big-changes-in-business-communications/
- Smarsh, “2015 Electronic Communications Compliance Survey Report”
http://www.smarsh.com/whitepapers/2015-electronic-communications-compliance-survey-report
of business users use text
messaging for business
communications. Those text
messages can pose a significant risk.
79%
of those that allowed text
messaging had minimal or
no confidence in their
ability to produce messages if requested.
60%
reason digital
communications data
is leveraged
Outside of audits, litigation and
e-discovery requests are the
#1
GETTING A CLUE:
UNCOVERING THE TRUTH ABOUT YOUR DATA
WITH MOBILE FORENSICS
STANDARD QUESTIONS LEGAL HAS FOR I.T.
DURING DISCOVERY OF DATA:
Enterprise I.T. can play a critical role in creating a plan to address the mobile eDiscovery risks.
WITH MOBILE FORENSICS, I.T. CAN:
Texts and instant messages are increasingly at issue in
investigations and litigation. But extracting them from
mobile devices can be expensive and time consuming,
if possible at all.”
druva.com/proactivecompliance
- Gibson Dunn “2015 Mid-Year E-Discovery Update”
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
I think I left my laptop a
tthebardang
it LO
L I had so many important files on
there
There’s a package at my desk
t
hatdidn’thavemynam
e
on
it but I opened it anywa
y.Guess
Se
e
you
at the restaurant at 7:30. Bring your
laptop
w
it
h
you, I want to discuss the
deal
Do you know the password to the NAS drive? Need to access some impo
I’
m
not supposed to say anything but Bob is getting fired for a
Sources: