The 2018 Northeast eDiscovery and Information Governance Retreat was 
Stratagies For Data Minimization Of Legacy Data
Backup and archiving should be viewed as separate functions. When it comes to spoliation (FRCP Rule 37), reasonableness of the company’s data retention plan is key. Over preservation is expensive. There are not many cases on Rule 37 relating to backup tapes. People are changing their behavior due to the changes in the FRCP, especially in heavily regulated industries such as healthcare and financial services. Studies find that typically 70% of data has no business value and is not subject to legal hold or retention requirements for compliance. When using machine learning, you can focus on finding what to keep or what to get rid of. It is often best to start with unsupervised machine learning. Be mindful of destructive malware. To mitigate security risks, it is important to know where your data (including backup tapes) is. If a backup tape goes missing, do you need to notify customers (privacy)? To get started, create a matrix showing what you need to keep, keeping in mind legal holds and privacy (GDPR). Old backup tapes are subject to GDPR. Does the right to be forgotten apply to backup tapes? There is currently no answer. It would be hard to selectively delete data from the tapes, so maybe have a process that deletes during the restore. There can be conflicts between U.S. ediscovery and GDPR, so you must decide which is the bigger risk.
Preparing A Coordinated Response To Government Inquiries And Investigations
You might find out that you are being investigated by the FBI or other investigator approaching one of your employees — get an attorney.
Digging Into TAR
I moderated this panel, so I didn’t take notes. We challenged the audience to create a keyword search that would work better than technology-assisted review. Results are posted here.
Implementing Information Governance – Nightmare On Corporate America Street?
You need to weigh the value of the data against the risk of keeping it. What is your business model? That will dictate information governance.
Technology Solution Update From Corporate, Law Firm And Service Provider Perspective
Artificial intelligence (AI) should not merely analyze; it should present a result in a way that is actionable. It might tell you how much two people talk, their sentiment, and whether there are any spikes in communication volume. AI can be used by law firms for budgeting by analyzing prior matters. There are concerns about privacy with AI. Many clients are moving to the cloud. Many are using private clouds for collaboration, not necessarily for utilizing large computing power. Office 365 is of interest to many companies. There was extensive discussion about the ediscovery analytics capabilities being added from the Equivio acquisition, and a demo by Marcel Katz of Microsoft. The predictive coding (TAR) capability uses simple active learning (SAL) rather than continuous active learning (CAL). It is 20 times slower in the cloud than running Equivio on premises. There is currently no review tool in Office 365, so you have to export the predictions out and do the review elsewhere. Mobile devices create additional challenges for ediscovery. The time when a text message is sent may not match the time when it is received if the receiving device is off when the message is sent. Technology needs to be able to handle emojis. There are many different apps with many different data storage formats.
The ‘Team Of Teams’ Approach To Enterprise Security And Threat Management
Fast response is critical when you are attacked. Response must be automated because a human response is not fast enough. It can take 200 days to detect an adversary on the network, so assume someone is already inside. What are the critical assets, and what threats should you look for? What value does the data have to the attacker? What is the impact on the business? What is the impact on the people? Know what is normal for your systems. Is a large data transfer at 2:00am normal? Simulate a phishing attack and see if your employees fall for it. In one case a CEO was known to be in China for a deal, so someone impersonating the CEO emailed the CFO to send $50 million for the deal. The money was never recovered. Have processes in place, like requiring a signature for amounts greater than $10,000. If a company is doing a lot of acquisitions, it can be hard to know what is on their network. How should small companies get started? Change passwords, hire an external auditor, and make use of open source tools.
From Data To GRC Insight
Governance, risk management, and compliance (GRC) needs to
