SlideShare une entreprise Scribd logo
1  sur  8
eDiscovery without the headaches Policies, Processes and People
Covering the EDRM 11/24/2009 2
eDiscovery Readiness Network Mapping Data Mapping Policy Procedure Protocol Education To do IM/RM Tools Team Protocol Education Experts Technology 3 11/24/2009 3
Identification 11/24/2009 4 Scoping Search Capacity Network Analysis Technology Analysis Network Crawling Strategy
Preservation Onsite Collection Hold Protocol and Process Relevance Metadata Hold Release 11/24/2009 5
Collection Remotely Onsite Forensic Imaging Logical collection Manual Copy Protocol and Education Chain of custody Hosting 11/24/2009 6
Processing DeNISTing Metadata Extraction Filtering Triage Deduplication Near-Deduplication Searching Keyword Concept Relation Clustering Compatible load files 11/24/2009 7
Questions? Dominic Jaar djaar@ledjit.com514.212.9348www.ledjit.com

Contenu connexe

Tendances

Tendances (7)

Nordic Tryggve project
Nordic Tryggve projectNordic Tryggve project
Nordic Tryggve project
 
The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008The Standards Dilemma - Digital Library Standards 2008
The Standards Dilemma - Digital Library Standards 2008
 
Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...Toward distributed infrastructures for digital preservation: the roles of col...
Toward distributed infrastructures for digital preservation: the roles of col...
 
Intro to Digital Preservation
Intro to Digital PreservationIntro to Digital Preservation
Intro to Digital Preservation
 
ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Data sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataData sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” data
 

En vedette

Numérisation de substitution
Numérisation de substitutionNumérisation de substitution
Numérisation de substitution
Ledjit
 
CEIC 2010 international panel
CEIC 2010 international panelCEIC 2010 international panel
CEIC 2010 international panel
Ledjit
 

En vedette (7)

Numérisation de substitution
Numérisation de substitutionNumérisation de substitution
Numérisation de substitution
 
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
 
The radio shack court
The radio shack courtThe radio shack court
The radio shack court
 
Rixe sur la preuve électronique
Rixe sur la preuve électroniqueRixe sur la preuve électronique
Rixe sur la preuve électronique
 
CEIC 2010 international panel
CEIC 2010 international panelCEIC 2010 international panel
CEIC 2010 international panel
 
The ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth ReviewThe ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth Review
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
 

Similaire à eDiscovery without the headaches

EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
EMC
 
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docxComputer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
maxinesmith73660
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
Gary Wilhelm
 

Similaire à eDiscovery without the headaches (20)

EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Research Data Management Implementations
Research Data Management Implementations Research Data Management Implementations
Research Data Management Implementations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docxComputer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Comparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation EducationComparing Curricula for Digital Library and Digital Curation Education
Comparing Curricula for Digital Library and Digital Curation Education
 
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
2011 IM Symposium - eDiscovery - Turning Risks into Rewards Developing a Comp...
 
Ediscovery Fedisa Belgium
Ediscovery Fedisa BelgiumEdiscovery Fedisa Belgium
Ediscovery Fedisa Belgium
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
 

Plus de Ledjit

Le web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaireLe web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaire
Ledjit
 
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Ledjit
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...
Ledjit
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and Solutions
Ledjit
 
Documents and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s PerspectiveDocuments and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s Perspective
Ledjit
 

Plus de Ledjit (20)

Le web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaireLe web2.0, une mine d'information juridique et judiciaire
Le web2.0, une mine d'information juridique et judiciaire
 
Une nouvelle administration de la preuve
Une nouvelle administration de la preuveUne nouvelle administration de la preuve
Une nouvelle administration de la preuve
 
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
Le Procès Sans Papier - Objection... à toute la preuve présentée devant les t...
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and Solutions
 
Documents and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s PerspectiveDocuments and Discovery in Government - Alberta’s Perspective
Documents and Discovery in Government - Alberta’s Perspective
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
Preuve électronique + Procédure
Preuve électronique + ProcédurePreuve électronique + Procédure
Preuve électronique + Procédure
 
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
Gestion De L’Information - Obligations et responsabilités du conseiller jurid...
 
60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutes60 Trucs et astuces Word en 60 minutes
60 Trucs et astuces Word en 60 minutes
 
The Portable Courtroom
The Portable CourtroomThe Portable Courtroom
The Portable Courtroom
 
Salle d'audience portable
Salle d'audience portableSalle d'audience portable
Salle d'audience portable
 
Production of Documents, Technology and Costs
Production of Documents, Technology and CostsProduction of Documents, Technology and Costs
Production of Documents, Technology and Costs
 
Le Web2
Le Web2Le Web2
Le Web2
 
L'administration de la preuve électronique
L'administration de la preuve électroniqueL'administration de la preuve électronique
L'administration de la preuve électronique
 
Présentation de la preuve électronique
Présentation de la preuve électroniquePrésentation de la preuve électronique
Présentation de la preuve électronique
 
Rédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'informationRédaction et mise en place d’une politique de gestion de l'information
Rédaction et mise en place d’une politique de gestion de l'information
 
Révision et analyse des documents
Révision et analyse des documentsRévision et analyse des documents
Révision et analyse des documents
 
L'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAPL'administration de la preuve électronique - présnentation à CAP
L'administration de la preuve électronique - présnentation à CAP
 
L'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespaceL'Administration de la preuve électronique - Cours de droit du cyberespace
L'Administration de la preuve électronique - Cours de droit du cyberespace
 

eDiscovery without the headaches