SlideShare uma empresa Scribd logo
1 de 15
Legacy Data Remediation: A Practical Approach
Presented to the Association of Litigation Support Professionals
                                     Wednesday, March 30, 2011
Today’s Panel
Andy Cosgrove
Partner, Redgrave LLP
acosgrove@redgravellp.com


Christian Rummelhoff
Senior Analyst, Redgrave LLP
crummelhoff@redgravellp.com


Diana Fasching
Senior Analyst, Redgrave LLP
dfasching@redgravellp.com

                                               2
Presentation Goals

• Gain legal and technical perspectives into a legacy
  data remediation project

• Identify unique issues associated with the remediation
  of paper and electronic legacy data

• Introduce ways to manage costs and limit burdens on
  everyday business operations




                                                           3
Top 5 Reasons to Take Notice

TOP   #5) Litigation Costs

      #4) Litigation Risks; Why Keep Tomorrow’s
          Smoking Gun?

      #3) Reputation Risks; The WikiLeaks Effect

      #2) State & Federal Privacy Regulations

      #1) Retention Costs; The Box Burden

                                                   4
Re-Defining Legacy Data

Paper:                               Electronic:
•   Paper files, Photographs,        •   Old Backup Tapes, Backups
    Marketing Materials, and Other       Made Prior to Data Migration
    Hardcopy Documents               •   Orphaned ESI (e.g.
•   Materials Stored On and/or           departmental file shares)
    Offsite (e.g. Iron Mountain)     •   Inactive/Decommissioned
•   Documents in the Possession          Servers
    of Third Parties                 •   Retained Collections of Hard
                                         Drives, CDs or other Media
                                     •   Data in the Possession of Third
                                         parties

                                                                           5
A Process for Addressing Legacy Data
        Iterative                    High-Level                 Risk-Focused

  Identify Disposition            Understand Data           Prepare Information
      Constraints                    Store(s)                 for Comparison
- Retention Obligations      -   Origins                    - Preservation Matrix and
- Statutory, Regulatory,     -   Date Ranges                  Materials Index
  Common Law Requirements    -   Formats                    - Similar Measures Allow
- Contractual Requirements   -   Content                      Direct Comparison
- Legal Hold Obligations     -   Custodian




  Disposition of Data        Apply Risk Assessment
                               (Reasonable Investigation)
                             - Is Info Likely Relevant?
                             - Is Info Likely Unique?
                             - Duty to Preserve/Maintain?


                                                                                        6
Remediation Framework/Considerations
•   3 Key Considerations: Iterative, High Level, Risk Focused
•   General Tips
    –   Work From Available Information; Infer Where Reasonable
    –   Identify Best Value Approaches to Additional Investigation
    –   Document Each Step

•   Identify Deletion/Destruction Constraints
    –   Identify/Clarify Constraints at Issue Using Measurable Descriptors
•   Understand Data Stores
    – Origins, Date Ranges, Formats, Content, Custodian
    – Key Differences in Population – Breakdown Material into Groups
    – Additional Investigation: Sampling, Interviews, Database Mining

•   Prepare Information for Comparison
    –   Constrains and Materials - Use Same/Similar Descriptors
•   Apply Risk Assessment to Identify Disposable Information
                                                                             7
Paper – A Real World Example
                         Situation    Process    Resolution


• Fortune 250 company with over 50K boxes of hard
  copy paper records eligible for disposition under the
  record schedule

• Desire to dispose of material not subject to legal hold

• Significant information available about the material in
  the boxes; less information available on open legal
  holds

• Cost of assessment needed to be proportional to the
  cost of storing the material
                                                              8
Paper – A Real World Example
                                   Situation         Process        Resolution


•   Validated information about the materials
    – Sampled boxes to confirm accuracy of indices
    – QC missing and suspect information (e.g., dates)
•   Gathered information regarding legal holds
    – Reviewed all open holds and used available matter reporting capabilities
    – Follow-up
•   Created “Preservation Matrix”
    – Consolidated holds into manageable number of categories
    – Each category had as broad a scope as the sum of the component holds
    – Primary considerations: Record Code, Date Range; Also Geography,
      Department,
    – Obtained case-team sign-off on hold scope assumptions
    – High quality of indices meant no need for equivalent categorization of
      material
•   Iterative, Risk-Based Assessment
                                                                                 9
Paper – A Real World Example
                                 Situation         Process        Resolution


• Recommended reasonable and legally defensible
  disposition of specific material
   – One third cleared at the first iteration (Record Code)
   – Another third cleared at the Record Code by date iteration
   – Final third held by a handful of cases requiring case-specific additional
     follow-up (collection, case team identification of relevant materials)
• Other significant highlights:
   – Process from took longer than originally planned –the evolving hold
     environment (as cases open/close) complicated analysis
   – Outside counsel required some case-specific additional steps
• Next time…
   – Identify critical cases (and most conservative attorneys) and involve
     those case teams much earlier in the process to prevent delays

                                                                                 10
ESI – A Real World Example
                             Situation       Process       Resolution


• Global 500 company with over 60K legacy media
  items in one division
• Mostly backup tapes
   – Varying tape types and backup mechanisms (including NDMP)
• Media assumed to contain emails, user files,
  application data and other unknown content
• Little to no inventory information available for a large
  subset of the media items
• Desire to dispose of this information to reduce legal
  risk and storage costs



                                                                        11
ESI – A Real World Example
                                  Situation         Process         Resolution


•   Identified team members
•   Researched as much information as possible regarding
    media items and legal holds
•   Established sampling hypothesis
    – Materials on backup media were largely duplicative because legal hold
      custodians were preserving materials in active storage
•   Developed sampling strategy
    – Selected less than 50 (out of over 60K) media items to sample, targeting
      different date ranges and content (both email and file share backups)
•   Restored, indexed and then filtered data based on legal
    hold keywords
•   Reviewed for “responsiveness” and selected statistically
    valid set of emails and user files
•   Worked with custodians (and IT for former employees) to
    validate hypothesis
                                                                                 12
ESI – A Real World Example
                               Situation        Process       Resolution


• Recommended reasonable and legally defensible
  disposition of media items
• Proceeded with destruction/recycling of approximately
  80% of legacy media items
• Continued hold on the remaining media items
• Other significant highlights:
   – Process from kick-off to recommendations took about 8 months —
     several months longer than originally planned
   – Had to be flexible and adjust plan as issues were encountered
   – End result was well-received within Legal and by IT
   – Considering different approach on subsequent projects to minimize
     vendor costs


                                                                           13
Other Real World Examples




Examples?



                                  14
Additional Resources

• www.redgravellp.com:
  – Webcasts: “What do you want your legacy to be?”
  – Link: Sedona Commentary on Inactive Information
  – Podcast Links:
     • Dealing with Legacy Data – What to do About ESI Messes Today
     • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools


• Organizations:




                                                                                  15

Mais conteúdo relacionado

Mais procurados

Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open ScienceOpenAIRE
 
Data-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksData-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksMicah Altman
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Martin Donnelly
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Jeph Pedrigal
 
Needs for Data Management & Citation Throughout the Information Lifecycle
Needs for Data Management & Citation Throughout  the Information LifecycleNeeds for Data Management & Citation Throughout  the Information Lifecycle
Needs for Data Management & Citation Throughout the Information LifecycleMicah Altman
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondBenoit Pauwels
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)OpenAIRE
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing DataOpenAIRE
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open ScienceOpenAIRE
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBigDataExpo
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageAccenture
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Patricia M Watson
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?OpenAIRE
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introductionMichael Day
 

Mais procurados (20)

State Agency Basic Training
State Agency Basic TrainingState Agency Basic Training
State Agency Basic Training
 
Lecture 01 Data Mining
Lecture 01 Data MiningLecture 01 Data Mining
Lecture 01 Data Mining
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Electronic Records Training
Electronic Records TrainingElectronic Records Training
Electronic Records Training
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science
 
Data-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation WorksData-PASS: How Collaborative Presentation Works
Data-PASS: How Collaborative Presentation Works
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...Managing and Sharing Research Data: Good practices for an ideal world...in th...
Managing and Sharing Research Data: Good practices for an ideal world...in th...
 
Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210Prelims Coverage for CMDM 2210
Prelims Coverage for CMDM 2210
 
Needs for Data Management & Citation Throughout the Information Lifecycle
Needs for Data Management & Citation Throughout  the Information LifecycleNeeds for Data Management & Citation Throughout  the Information Lifecycle
Needs for Data Management & Citation Throughout the Information Lifecycle
 
Digital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the PondDigital Preservation Best Practices: Lessons Learned From Across the Pond
Digital Preservation Best Practices: Lessons Learned From Across the Pond
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & Governance
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 

Destaque

The three unseen threats in the air we breathe yes 02252017 final
The three unseen threats in the air we breathe yes  02252017 finalThe three unseen threats in the air we breathe yes  02252017 final
The three unseen threats in the air we breathe yes 02252017 finalSpeaking Green Communications
 
Object Oriented Programming in C# - Lecture 01
Object Oriented Programming in C# - Lecture 01Object Oriented Programming in C# - Lecture 01
Object Oriented Programming in C# - Lecture 01Asad Hanif
 
How to Change Lives with Healthy Habits & Digital Health Technology
How to Change Lives with Healthy Habits & Digital Health TechnologyHow to Change Lives with Healthy Habits & Digital Health Technology
How to Change Lives with Healthy Habits & Digital Health TechnologyDexter Wee
 
SocialAudiences_2015
SocialAudiences_2015SocialAudiences_2015
SocialAudiences_2015Tyler Furnari
 
Mood Disorder Clinical Depression
Mood Disorder Clinical DepressionMood Disorder Clinical Depression
Mood Disorder Clinical DepressionChristina Van Horne
 
1.3.4 Система металлических труб Cosmec
1.3.4 Система металлических труб Cosmec1.3.4 Система металлических труб Cosmec
1.3.4 Система металлических труб CosmecIgor Golovin
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesIntroduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesAmazon Web Services
 
Best Practices for Integrating Active Directory with AWS Workloads
Best Practices for Integrating Active Directory with AWS WorkloadsBest Practices for Integrating Active Directory with AWS Workloads
Best Practices for Integrating Active Directory with AWS WorkloadsAmazon Web Services
 
True But Sad Life Quotes by Broken Heart
True But Sad Life Quotes by Broken HeartTrue But Sad Life Quotes by Broken Heart
True But Sad Life Quotes by Broken HeartWishes Quotes
 
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Carmichael Billingsley
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16Carlos Carvalho
 
Dallas 2012 analysis
Dallas 2012 analysisDallas 2012 analysis
Dallas 2012 analysisSammi Wilde
 

Destaque (20)

The three unseen threats in the air we breathe yes 02252017 final
The three unseen threats in the air we breathe yes  02252017 finalThe three unseen threats in the air we breathe yes  02252017 final
The three unseen threats in the air we breathe yes 02252017 final
 
Object Oriented Programming in C# - Lecture 01
Object Oriented Programming in C# - Lecture 01Object Oriented Programming in C# - Lecture 01
Object Oriented Programming in C# - Lecture 01
 
How to Change Lives with Healthy Habits & Digital Health Technology
How to Change Lives with Healthy Habits & Digital Health TechnologyHow to Change Lives with Healthy Habits & Digital Health Technology
How to Change Lives with Healthy Habits & Digital Health Technology
 
Cafeteria ETITC PROBLEMATICA
Cafeteria ETITC PROBLEMATICACafeteria ETITC PROBLEMATICA
Cafeteria ETITC PROBLEMATICA
 
Tren Yikama Sistemleri - DBF Otomati̇k Endüstriyel Yikama Sistemleri Tanitimi...
Tren Yikama Sistemleri - DBF Otomati̇k Endüstriyel Yikama Sistemleri Tanitimi...Tren Yikama Sistemleri - DBF Otomati̇k Endüstriyel Yikama Sistemleri Tanitimi...
Tren Yikama Sistemleri - DBF Otomati̇k Endüstriyel Yikama Sistemleri Tanitimi...
 
Att portacontenedor extensible
Att portacontenedor extensibleAtt portacontenedor extensible
Att portacontenedor extensible
 
SocialAudiences_2015
SocialAudiences_2015SocialAudiences_2015
SocialAudiences_2015
 
Las redes sociales
Las redes socialesLas redes sociales
Las redes sociales
 
Kirkpatrick model
Kirkpatrick modelKirkpatrick model
Kirkpatrick model
 
Mood Disorder Clinical Depression
Mood Disorder Clinical DepressionMood Disorder Clinical Depression
Mood Disorder Clinical Depression
 
Mga Uri ng Talumpati
Mga Uri ng TalumpatiMga Uri ng Talumpati
Mga Uri ng Talumpati
 
1.3.4 Система металлических труб Cosmec
1.3.4 Система металлических труб Cosmec1.3.4 Система металлических труб Cosmec
1.3.4 Система металлических труб Cosmec
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesIntroduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services
 
Best Practices for Integrating Active Directory with AWS Workloads
Best Practices for Integrating Active Directory with AWS WorkloadsBest Practices for Integrating Active Directory with AWS Workloads
Best Practices for Integrating Active Directory with AWS Workloads
 
True But Sad Life Quotes by Broken Heart
True But Sad Life Quotes by Broken HeartTrue But Sad Life Quotes by Broken Heart
True But Sad Life Quotes by Broken Heart
 
Pearl Harbor Tour Webinar
Pearl Harbor Tour WebinarPearl Harbor Tour Webinar
Pearl Harbor Tour Webinar
 
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16
 
Dallas 2012 analysis
Dallas 2012 analysisDallas 2012 analysis
Dallas 2012 analysis
 

Semelhante a Practical Legacy Data Remediation - Redgrave LLP

Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesKathirvel Ayyaswamy
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital PreservationBill LeFurgy
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data ManagementJamie Bisset
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data managementopl10
 
Introduction to data management
Introduction to data managementIntroduction to data management
Introduction to data managementCunera Buys
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementMarieke Guy
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdfGnanavi2
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...ICPSR
 
Graham Pryor
Graham PryorGraham Pryor
Graham PryorEduserv
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management PlanKristin Briney
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersRebekah Cummings
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementKristin Briney
 

Semelhante a Practical Legacy Data Remediation - Redgrave LLP (20)

BAS 250 Lecture 1
BAS 250 Lecture 1BAS 250 Lecture 1
BAS 250 Lecture 1
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
DBMS
DBMSDBMS
DBMS
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data management
 
Introduction to data management
Introduction to data managementIntroduction to data management
Introduction to data management
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data Management
 
20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths20130222 kaptur training_goldsmiths
20130222 kaptur training_goldsmiths
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Data cycle health
Data cycle healthData cycle health
Data cycle health
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Graham Pryor
Graham PryorGraham Pryor
Graham Pryor
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management Plan
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate Researchers
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data Management
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Practical Legacy Data Remediation - Redgrave LLP

  • 1. Legacy Data Remediation: A Practical Approach Presented to the Association of Litigation Support Professionals Wednesday, March 30, 2011
  • 2. Today’s Panel Andy Cosgrove Partner, Redgrave LLP acosgrove@redgravellp.com Christian Rummelhoff Senior Analyst, Redgrave LLP crummelhoff@redgravellp.com Diana Fasching Senior Analyst, Redgrave LLP dfasching@redgravellp.com 2
  • 3. Presentation Goals • Gain legal and technical perspectives into a legacy data remediation project • Identify unique issues associated with the remediation of paper and electronic legacy data • Introduce ways to manage costs and limit burdens on everyday business operations 3
  • 4. Top 5 Reasons to Take Notice TOP #5) Litigation Costs #4) Litigation Risks; Why Keep Tomorrow’s Smoking Gun? #3) Reputation Risks; The WikiLeaks Effect #2) State & Federal Privacy Regulations #1) Retention Costs; The Box Burden 4
  • 5. Re-Defining Legacy Data Paper: Electronic: • Paper files, Photographs, • Old Backup Tapes, Backups Marketing Materials, and Other Made Prior to Data Migration Hardcopy Documents • Orphaned ESI (e.g. • Materials Stored On and/or departmental file shares) Offsite (e.g. Iron Mountain) • Inactive/Decommissioned • Documents in the Possession Servers of Third Parties • Retained Collections of Hard Drives, CDs or other Media • Data in the Possession of Third parties 5
  • 6. A Process for Addressing Legacy Data Iterative High-Level Risk-Focused Identify Disposition Understand Data Prepare Information Constraints Store(s) for Comparison - Retention Obligations - Origins - Preservation Matrix and - Statutory, Regulatory, - Date Ranges Materials Index Common Law Requirements - Formats - Similar Measures Allow - Contractual Requirements - Content Direct Comparison - Legal Hold Obligations - Custodian Disposition of Data Apply Risk Assessment (Reasonable Investigation) - Is Info Likely Relevant? - Is Info Likely Unique? - Duty to Preserve/Maintain? 6
  • 7. Remediation Framework/Considerations • 3 Key Considerations: Iterative, High Level, Risk Focused • General Tips – Work From Available Information; Infer Where Reasonable – Identify Best Value Approaches to Additional Investigation – Document Each Step • Identify Deletion/Destruction Constraints – Identify/Clarify Constraints at Issue Using Measurable Descriptors • Understand Data Stores – Origins, Date Ranges, Formats, Content, Custodian – Key Differences in Population – Breakdown Material into Groups – Additional Investigation: Sampling, Interviews, Database Mining • Prepare Information for Comparison – Constrains and Materials - Use Same/Similar Descriptors • Apply Risk Assessment to Identify Disposable Information 7
  • 8. Paper – A Real World Example Situation Process Resolution • Fortune 250 company with over 50K boxes of hard copy paper records eligible for disposition under the record schedule • Desire to dispose of material not subject to legal hold • Significant information available about the material in the boxes; less information available on open legal holds • Cost of assessment needed to be proportional to the cost of storing the material 8
  • 9. Paper – A Real World Example Situation Process Resolution • Validated information about the materials – Sampled boxes to confirm accuracy of indices – QC missing and suspect information (e.g., dates) • Gathered information regarding legal holds – Reviewed all open holds and used available matter reporting capabilities – Follow-up • Created “Preservation Matrix” – Consolidated holds into manageable number of categories – Each category had as broad a scope as the sum of the component holds – Primary considerations: Record Code, Date Range; Also Geography, Department, – Obtained case-team sign-off on hold scope assumptions – High quality of indices meant no need for equivalent categorization of material • Iterative, Risk-Based Assessment 9
  • 10. Paper – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of specific material – One third cleared at the first iteration (Record Code) – Another third cleared at the Record Code by date iteration – Final third held by a handful of cases requiring case-specific additional follow-up (collection, case team identification of relevant materials) • Other significant highlights: – Process from took longer than originally planned –the evolving hold environment (as cases open/close) complicated analysis – Outside counsel required some case-specific additional steps • Next time… – Identify critical cases (and most conservative attorneys) and involve those case teams much earlier in the process to prevent delays 10
  • 11. ESI – A Real World Example Situation Process Resolution • Global 500 company with over 60K legacy media items in one division • Mostly backup tapes – Varying tape types and backup mechanisms (including NDMP) • Media assumed to contain emails, user files, application data and other unknown content • Little to no inventory information available for a large subset of the media items • Desire to dispose of this information to reduce legal risk and storage costs 11
  • 12. ESI – A Real World Example Situation Process Resolution • Identified team members • Researched as much information as possible regarding media items and legal holds • Established sampling hypothesis – Materials on backup media were largely duplicative because legal hold custodians were preserving materials in active storage • Developed sampling strategy – Selected less than 50 (out of over 60K) media items to sample, targeting different date ranges and content (both email and file share backups) • Restored, indexed and then filtered data based on legal hold keywords • Reviewed for “responsiveness” and selected statistically valid set of emails and user files • Worked with custodians (and IT for former employees) to validate hypothesis 12
  • 13. ESI – A Real World Example Situation Process Resolution • Recommended reasonable and legally defensible disposition of media items • Proceeded with destruction/recycling of approximately 80% of legacy media items • Continued hold on the remaining media items • Other significant highlights: – Process from kick-off to recommendations took about 8 months — several months longer than originally planned – Had to be flexible and adjust plan as issues were encountered – End result was well-received within Legal and by IT – Considering different approach on subsequent projects to minimize vendor costs 13
  • 14. Other Real World Examples Examples? 14
  • 15. Additional Resources • www.redgravellp.com: – Webcasts: “What do you want your legacy to be?” – Link: Sedona Commentary on Inactive Information – Podcast Links: • Dealing with Legacy Data – What to do About ESI Messes Today • Will Judges Think it is Okay to Use Clustering & Suggestive Coding Tools • Organizations: 15