SlideShare une entreprise Scribd logo
1  sur  59
Télécharger pour lire hors ligne
Digital law and governance 
e-discovery 
Jacques 
Folon 
www.folon.com 
Partner 
Edge 
Consulting 
Maître 
de 
conférences 
Université 
de 
Liège 
Chargé 
de 
cours 
ICHEC 
Brussels 
Management 
School 
Professeur 
invité 
Université 
de 
Lorraine 
(Metz) 
ESC 
Rennes 
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
4
1.where are we now ? 
2.Need of an electronic content 
management 
3.E-discovery 
4.Sedona Principles 
3
1. Where are we now? 
5
Information overload 
6
Control ?
Which information ? 
• Electronically stored information (ESI) 
• Scannes documents 
• Fax 
• Texts, excel sheets, powerpoint (word, pages, 
including old versions of the software versions) 
• Emails in & out 
• Databases, websites, blogs,… 
• Hard disks (central, local, pc, external, USB 
sticks, …) 
• CRM, CMS 
• GSM et PDA 
• Time sheet 
• Acounting 
• Intant messaging 
• Voice mail 
• GPS navigation systems 
• Metadata 
• social networks (internbal & external) 
• … 8
9 
Increase of data from 2010 ->2014 = + 650% (Gartner) 
85% of the data are not structured 
80% of data search gave no result
2. Prerequisite: 
Electronic data management 
10
www.aiim.org/training
Source : https://www.britestream.com/difference.html.
The importance of records 
• Most of today’s 
records start out 
in electronic form 
– Letters 
– Emails 
– Faxes 
– Web transactions 
– Other transactions 
Source: What is ERM www.aiim.org/training 
Copyright © AIIM | All rights reserved
Electronic records management 
Question: Is ERM 
• The electronic management of paper 
records? 
• The management of electronic records? 
Answer: Both 
Source: What is ERM www.aiim.org/training
Content types and how well managed 
For each type of content, evaluate the degree of control that exists in your 
organization in managing it. 
All respondents (462) 
Source: What is ERM www.aiim.org/training
What are the main business drivers? 
Effectiveness 
ERM 
Efficiency 
Continuity 
Compliance 
Copyright © AIIM | All Srigohtus rrecseerv:e dWhat is ERM www.aiim.org/training
Driver: Compliance 
• Laws 
• Regulations 
• Policies 
• Standards 
• Good practice 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Effectiveness 
• Not losing records 
• Sharing records 
• Finding records easily 
• Getting the complete picture 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Efficiency 
• Accessing records quickly 
• Space savings 
• Reduced handling costs 
• Other examples 
– Archival costs 
– Disposal of furniture 
– Consumables 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Continuity 
• Records are vulnerable to loss 
• Businesses tend to fail if they 
lose their records 
• Electronic storage may 
speed recovery from 
a disaster 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
The records lifecycle 
Source: NARA 
Copyright © AIIM | All rights reserved 
Source: What is ERM www.aiim.org/training
Fundamental principles 
• Records are created, received, 
and used in the conduct of 
organisational activities 
• Organisations should create 
and maintain authentic, 
reliable, and usable records 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Access and usage principles 
• Records should be accessible to authorised 
users 
• Users should be able to 
search and access records 
in usable formats 
• Records should be organised 
to support access and 
management 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Retention principles 
• Records must be managed through their 
lifecycle 
• Records should be kept as long as required 
– Statutory requirements 
– Legal requirements 
– Business or operational needs 
• Retaining records longer than required may 
increase organisational liability 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Disposition principles 
• Disposition is an accepted phase of the 
records lifecycle 
– Transfer/accession 
– Destruction 
• Records should be 
disposed of at the 
end of the lifecycle 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
What is ‘Capture’ 
ERM System 
Capture 
Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
The purpose of capturing records 
▪Establish a relationship between the record 
and its context 
▪Place the record into a controlled 
environment 
▪Link the record to other related records 
▪Allow the record to be managed effectively 
Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
Why not capture everything? 
• Hard cost of storage 
• Volume of non-records to sift through 
– Operationally 
– For legal or audit requirements 
• Increased liability for 
disclosing too much 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
So, what is metadata? 
• Metadata = “Data about data” 
– For a document or record this means data such 
as its author, its title, the issue date, and other 
information which can usefully be associated 
with it 
• Nothing new or unique 
• Defined in terms of units called “Elements” 
or “Fields.” 
– Some support “sub-elements” or “attributes” 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Perspectives on metadata 
• Entering metadata is often called “indexing” 
• Different users of an ERM system will have 
different views of what metadata can do for 
them, and what metadata is required 
– Business perspective 
– Records management perspective 
– User perspective 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Why is access control necessary? 
• Ensure ‘systematic control’ and ‘credible 
evidence’ 
• Ensure authoritative records 
• Protect commercially sensitive information 
• Protect personal 
information 
• Limit access to protectively 
marked information 
Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
The objects of user access rights 
• Provide or limit access to specific 
classes, 
files or records 
• Provide or limit access to features 
• Provide or limit access by security 
classification 
– ‘Need to know’ 
Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
Retention periods - 1 
• Capturing a record implies need for 
retention 
• A record may be retained in different ways 
– ERM system 
– Software application 
– Separate electronic media 
– Paper 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Retention periods - 2 
• Records will vary in their intrinsic nature 
• Some records may need to be retained for 
very long periods of time 
• Other records will need to be 
retained for shorter periods 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
The benefits of destroying records 
• Keeping everything forever is expensive 
– Storage costs 
– Search and retrieval 
– Discovery 
• Courts have held that there is no 
requirement to keep everything forever 
• Destroying records reduces risk 
– When it is done consistently and in accordance 
with the records program 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
3. After ERM => ediscovery 
36
Definition & context 
• E-dicovery is a process to search, localise, 
secure, identify a data in order to have it 
as an evidence before the court 
• Necessity to have a quick result 
• the right data at the right time 
• translation sometimes necessary 
Source www.systran.fr 37
Ediscovery model 
38 
Source for the next 9 slides: http://edrm.net
1/information mgt 
39
2/ identification 
40
3/ preservation 
41
4/ collection 
Collection is the acquisition of potentially relevant electronically stored information 
(ESI) as defined in the identification phase of the electronic discovery process. The 
exigencies of litigation, governmental inquiries, and internal investigations generally 
require that ESI and its associated metadata should be collected in a manner that is 
legally defensible, proportionate, efficient, auditable, and targeted. 
42
5/ processing 
43
6/ review 
44
7/ Analyse 
45
8/ Production 
46
9/ Presentation 
47
GSA IT Quarterly Forum -- 
Aug 2007 
48 
4/ The Sedona Principles: 
Best Practices Recommendations & Principles for Addressing Electronic Document 
Production 
(Second edition, June 2007) 
The Sedona Guidelines: 
Best Practices Guidelines & Commentary for Managing Information and Records in the 
Electronic Age 
(Sept. 2005)
49 
The Sedona Guidelines 
– Second work product of working group 
– Draft published in September 2004 for public comment; published 
in September 2005. 
– They are: 
• Important background and roadmap of issues 
• Link between RIM, IT and Legal Perspectives 
• Flexible, Scalable and Reasonable 
– They are not: 
• Standards or minimum requirements 
• Unchangeable
50 
The Sedona Guidelines 
• 1. An organization should have reasonable policies and 
procedures for managing its information and records.
The Sedona Guidelines 
• 2. An organization’s information and records management 
policies and procedures should be realistic, practical and 
tailored to the circumstances of the organization. 
51
52 
The Sedona Guidelines 
• 3. An organization need not retain all electronic 
information ever generated or received.
The Sedona Guidelines 
• 4. An organization adopting an information and records 
management policy should consider including procedures 
that address the creation, identification, retention, retrieval 
and ultimate disposition or destruction of information and 
records. 
53
The Sedona Guidelines 
• 5. An organization’s policies and procedures must mandate 
the suspension of ordinary destruction practices and 
procedures as necessary to comply with preservation 
obligations related to actual or reasonably anticipated 
litigation, governmental investigation or audit. 
54
5. Conclusion 
55
Information security manager
Are we ready to be there? 
59
Jacques Folon 
Jacques.folon@ichec.be
Any questions ?

Contenu connexe

Tendances

Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business casepmcbrideva1
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarBrian Campbell
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 

Tendances (20)

Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Online terms & conditions
Online terms & conditionsOnline terms & conditions
Online terms & conditions
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations Seminar
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 

Similaire à Digital documents & e-discovery

What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?Atle Skjekkeland
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeepingExpoco
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesIna Smith
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0Paul Hampton
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
Ch12 records management
Ch12 records managementCh12 records management
Ch12 records managementxtin101
 
SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology Sonny Thai
 
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouGetting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouInnoTech
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital PreservationBill LeFurgy
 
Criteria for a trusted institutional repository
Criteria for a trusted institutional repositoryCriteria for a trusted institutional repository
Criteria for a trusted institutional repositoryIna Smith
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsBrian Anderson
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsEagle Technologies
 

Similaire à Digital documents & e-discovery (20)

Ediscovery
Ediscovery Ediscovery
Ediscovery
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeeping
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
 
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Why_ERM
Why_ERMWhy_ERM
Why_ERM
 
Ch12 records management
Ch12 records managementCh12 records management
Ch12 records management
 
Andrew waugh
Andrew waughAndrew waugh
Andrew waugh
 
SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology
 
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouGetting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
Data Archiving white paper
Data Archiving white paperData Archiving white paper
Data Archiving white paper
 
Criteria for a trusted institutional repository
Criteria for a trusted institutional repositoryCriteria for a trusted institutional repository
Criteria for a trusted institutional repository
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business Needs
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business Needs
 

Plus de Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

Plus de Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Dernier

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Dernier (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Digital documents & e-discovery

  • 1. Digital law and governance e-discovery Jacques Folon www.folon.com Partner Edge Consulting Maître de conférences Université de Liège Chargé de cours ICHEC Brussels Management School Professeur invité Université de Lorraine (Metz) ESC Rennes http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
  • 2. 4
  • 3. 1.where are we now ? 2.Need of an electronic content management 3.E-discovery 4.Sedona Principles 3
  • 4. 1. Where are we now? 5
  • 7. Which information ? • Electronically stored information (ESI) • Scannes documents • Fax • Texts, excel sheets, powerpoint (word, pages, including old versions of the software versions) • Emails in & out • Databases, websites, blogs,… • Hard disks (central, local, pc, external, USB sticks, …) • CRM, CMS • GSM et PDA • Time sheet • Acounting • Intant messaging • Voice mail • GPS navigation systems • Metadata • social networks (internbal & external) • … 8
  • 8. 9 Increase of data from 2010 ->2014 = + 650% (Gartner) 85% of the data are not structured 80% of data search gave no result
  • 9. 2. Prerequisite: Electronic data management 10
  • 12. The importance of records • Most of today’s records start out in electronic form – Letters – Emails – Faxes – Web transactions – Other transactions Source: What is ERM www.aiim.org/training Copyright © AIIM | All rights reserved
  • 13. Electronic records management Question: Is ERM • The electronic management of paper records? • The management of electronic records? Answer: Both Source: What is ERM www.aiim.org/training
  • 14. Content types and how well managed For each type of content, evaluate the degree of control that exists in your organization in managing it. All respondents (462) Source: What is ERM www.aiim.org/training
  • 15. What are the main business drivers? Effectiveness ERM Efficiency Continuity Compliance Copyright © AIIM | All Srigohtus rrecseerv:e dWhat is ERM www.aiim.org/training
  • 16. Driver: Compliance • Laws • Regulations • Policies • Standards • Good practice Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 17. Driver: Effectiveness • Not losing records • Sharing records • Finding records easily • Getting the complete picture Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 18. Driver: Efficiency • Accessing records quickly • Space savings • Reduced handling costs • Other examples – Archival costs – Disposal of furniture – Consumables Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 19. Driver: Continuity • Records are vulnerable to loss • Businesses tend to fail if they lose their records • Electronic storage may speed recovery from a disaster Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 20. The records lifecycle Source: NARA Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 21. Fundamental principles • Records are created, received, and used in the conduct of organisational activities • Organisations should create and maintain authentic, reliable, and usable records Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 22. Access and usage principles • Records should be accessible to authorised users • Users should be able to search and access records in usable formats • Records should be organised to support access and management Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 23. Retention principles • Records must be managed through their lifecycle • Records should be kept as long as required – Statutory requirements – Legal requirements – Business or operational needs • Retaining records longer than required may increase organisational liability Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 24. Disposition principles • Disposition is an accepted phase of the records lifecycle – Transfer/accession – Destruction • Records should be disposed of at the end of the lifecycle Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 25. What is ‘Capture’ ERM System Capture Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
  • 26. The purpose of capturing records ▪Establish a relationship between the record and its context ▪Place the record into a controlled environment ▪Link the record to other related records ▪Allow the record to be managed effectively Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
  • 27. Why not capture everything? • Hard cost of storage • Volume of non-records to sift through – Operationally – For legal or audit requirements • Increased liability for disclosing too much Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 28. So, what is metadata? • Metadata = “Data about data” – For a document or record this means data such as its author, its title, the issue date, and other information which can usefully be associated with it • Nothing new or unique • Defined in terms of units called “Elements” or “Fields.” – Some support “sub-elements” or “attributes” Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 29. Perspectives on metadata • Entering metadata is often called “indexing” • Different users of an ERM system will have different views of what metadata can do for them, and what metadata is required – Business perspective – Records management perspective – User perspective Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 30. Why is access control necessary? • Ensure ‘systematic control’ and ‘credible evidence’ • Ensure authoritative records • Protect commercially sensitive information • Protect personal information • Limit access to protectively marked information Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
  • 31. The objects of user access rights • Provide or limit access to specific classes, files or records • Provide or limit access to features • Provide or limit access by security classification – ‘Need to know’ Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
  • 32. Retention periods - 1 • Capturing a record implies need for retention • A record may be retained in different ways – ERM system – Software application – Separate electronic media – Paper Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 33. Retention periods - 2 • Records will vary in their intrinsic nature • Some records may need to be retained for very long periods of time • Other records will need to be retained for shorter periods Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 34. The benefits of destroying records • Keeping everything forever is expensive – Storage costs – Search and retrieval – Discovery • Courts have held that there is no requirement to keep everything forever • Destroying records reduces risk – When it is done consistently and in accordance with the records program Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 35. 3. After ERM => ediscovery 36
  • 36. Definition & context • E-dicovery is a process to search, localise, secure, identify a data in order to have it as an evidence before the court • Necessity to have a quick result • the right data at the right time • translation sometimes necessary Source www.systran.fr 37
  • 37. Ediscovery model 38 Source for the next 9 slides: http://edrm.net
  • 41. 4/ collection Collection is the acquisition of potentially relevant electronically stored information (ESI) as defined in the identification phase of the electronic discovery process. The exigencies of litigation, governmental inquiries, and internal investigations generally require that ESI and its associated metadata should be collected in a manner that is legally defensible, proportionate, efficient, auditable, and targeted. 42
  • 47. GSA IT Quarterly Forum -- Aug 2007 48 4/ The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production (Second edition, June 2007) The Sedona Guidelines: Best Practices Guidelines & Commentary for Managing Information and Records in the Electronic Age (Sept. 2005)
  • 48. 49 The Sedona Guidelines – Second work product of working group – Draft published in September 2004 for public comment; published in September 2005. – They are: • Important background and roadmap of issues • Link between RIM, IT and Legal Perspectives • Flexible, Scalable and Reasonable – They are not: • Standards or minimum requirements • Unchangeable
  • 49. 50 The Sedona Guidelines • 1. An organization should have reasonable policies and procedures for managing its information and records.
  • 50. The Sedona Guidelines • 2. An organization’s information and records management policies and procedures should be realistic, practical and tailored to the circumstances of the organization. 51
  • 51. 52 The Sedona Guidelines • 3. An organization need not retain all electronic information ever generated or received.
  • 52. The Sedona Guidelines • 4. An organization adopting an information and records management policy should consider including procedures that address the creation, identification, retention, retrieval and ultimate disposition or destruction of information and records. 53
  • 53. The Sedona Guidelines • 5. An organization’s policies and procedures must mandate the suspension of ordinary destruction practices and procedures as necessary to comply with preservation obligations related to actual or reasonably anticipated litigation, governmental investigation or audit. 54
  • 56.
  • 57. Are we ready to be there? 59