Six Keys to E-Discovery Compliance - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Six Keys to E-Discovery Compliance-8

loraThe Federal Rules of Civil Procedure addressing discovery of electronically stored information, or ESI, have changed the way companies think about information management and litigation holds. Before, they would have been looking through stacks of paper or scrolling through lists of e-mail after the discovery request was made. Now, they must take a more proactive approach and determine how such information should be best managed in order to retrieve it quickly when asked. 
 
After three years of talking to experts in the field, like Recommind VP Craig Carpenter or InBoxer CEO Roger Matus, our Lora Bentley has gathered quite a few pointers on how to avoid e-discovery pitfalls, and a handful of them have come up several times. For instance, most everyone is quick to remind companies that ESI is more than just e-mail and "documents," and that e-discovery is the intersection of IT and the legal department. Neither group should be expected to tackle these issues alone.

Lora has gathered a lot of resources on the issue here at her blog. It's a great read, and we've boiled it down to six key concepts in this quick slideshow.

More Slideshows:


Ten Reasons to Upgrade to Windows 7
So what are some of the practical things to like about Windows 7?


Seven Video Resume Tips for Job Seekers

Tips for job seekers looking to add a video component to their job search.


Top 10 Well-Compensated Execs of 09
Take a look at technology's top 10 highest-paid executives in 2009.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.