SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
CL109
Archiving and e-Discovery
for Novell GroupWise




Jim F. Lundberg
Vice President, Legal
Novell, Inc.



Travis Grandpre
Product Marketing Manager
Novell, Inc.
Why are Archiving and e-Discovery
    Issues Becoming More Significant?
    •   Legislation and Other Rules
        –   HIPAA
        –   SOX
        –   GLB
        –   FRCP
    •   Recessionary Times
        –   Cost cutting across all Corporate Budgets
        –   Fortune 500 impact




2   © Novell, Inc. All rights reserved.
Email Life Cycle – Creation

    •   SOX – Demonstrate origination from a specific person
    •   HIPAA – Protect against unauthorized access and
        include necessary disclaimers
    •   Outside messages require inbound verification and
        protection to avoid inappropriate content or security
        risks




3   © Novell, Inc. All rights reserved.
Email Life Cycle – Distribution

    •   HIPAA – Must prevent unintended distribution of health
        information
    •   GLB - Must prevent unintended distribution of
        confidential personal financial information
    •   SOX – Audit capabilities of distribution
    •   Protecting against unauthorized distribution of trade
        secrets or confidential information




4   © Novell, Inc. All rights reserved.
Email Life Cycle – Retention

    •   HIPAA, GLB – Requires protection against
        unauthorized access
    •   HIPAA, SOX, Litigation – Ability to search and retrieve.
    •   Litigation & audit - Protect against deletion or loss
        during.




5   © Novell, Inc. All rights reserved.
Email Policy Considerations

    •   Identity verification
    •   Information protection
    •   Content filtering
    •   Archiving and preservation
    •   Proof of compliance
    •   Authentication
    •   Virus and spam protection




6   © Novell, Inc. All rights reserved.
Electronic Discovery Obligations
    Evolving Standards in Litigation
         –   New Cases Every Day (e.g. The Pension Committee of the
             Univ. of Montreal, et. al. v. Banc of Am. Securities, LLC, et.al.)
         –   Duty to preserve arises “once a party reasonably anticipates
             litigation”.
         –   “Failure to preserve evidence resulting in the loss or destruction
             of relevant information is surely negligent and may be grossly
             negligent or willful”.
         –   “Gross Negligence” where there was “no evidence that the
             defendants did anything to stop routine destruction”.
         –   “Gross Negligence” where loss of data due to unfamiliarity with
             retention policy.
         –   Failure to collect or properly review can be grossly negligent or
             willful (includes former employees).
7   © Novell, Inc. All rights reserved.
“Spoliation”

    •   “Spoliation refers to the destruction or alteration of evidence.”
    •   Courts have inherent power to impose sanctions for spoliation.
    •   Sanctions include:
         –   Fines or “cost shifting”
         –   Evidence Preclusion
         –   Adverse Inference - “presume lost data was favorable to
             opposition's case”
         –   Dismissal or Default Judgment
    •   Severity of Sanction is generally based on the Judge's
        determination of party's negligence and relevance of data.




8   © Novell, Inc. All rights reserved.
Electronic Discovery Process

    •   Identification
    •   Preservation
    •   Collection
    •   Review
    •   Forensic data analysis
    •   Production

    *In 2008 - Fortune 500 companies estimated cost of litigation at $210 Billion (1/3 of
    after tax profit for that year)




9   © Novell, Inc. All rights reserved.
Identification

     •   What machines are connected to a network?
     •   Ability to identify individual files contained in email
         system
     •   Identifying requested information (ie.. file type, creator,
         custodians, access dates, keywords)




10   © Novell, Inc. All rights reserved.
Preservation

     •   Files and metadata
     •   Tracking preservation requests - “Litigation holds”
     •   “Holding in place” or “Copying to secure repository”




11   © Novell, Inc. All rights reserved.
Collection

     •   Automation vs. Custodian directed
     •   If responsive – requires copying for processing.
     •   Collection reports and logs
     •   Preserve integrity of metadata




12   © Novell, Inc. All rights reserved.
Review

     •   Inclusion vs. Exclusion           •   Search capabilities
          –   Identification                   –   Recognition
          –   Bates Numbering                  –   Categorization
          –   Privileges                       –   Redaction
          –   Work product                     –   Native File Format viewers
          –   Attorney-Client                  –   Exporting to various formats
          –   Confidentiality)                     – litigation support
                                                   databases or other review
                                                   products




13   © Novell, Inc. All rights reserved.
Forensic Data Analysis

     •   Metadata
     •   Custodian access
     •   Analysis of multiple repositories




14   © Novell, Inc. All rights reserved.
Production

     •   Electronic files vs. Hard Documents
     •   Native format
     •   Other format (ie. XML)




15   © Novell, Inc. All rights reserved.
Q&A
Partner Solutions




17   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Effective Linux Migration Processes
Effective Linux Migration ProcessesEffective Linux Migration Processes
Effective Linux Migration Processessheilamia
 
Realizing the Promise of the Cloud
Realizing the Promise of the CloudRealizing the Promise of the Cloud
Realizing the Promise of the CloudNovell
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the CouchNovell
 
Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1 Novell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyLessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
 
Novell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedtNovell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedtGWAVA
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
How to Maintain Software Appliances
How to Maintain Software AppliancesHow to Maintain Software Appliances
How to Maintain Software AppliancesNovell
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsNovell
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesNovell
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsNovell
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppCitrix
 
Building Blocks for Private and Hybrid Clouds
Building Blocks for Private and Hybrid CloudsBuilding Blocks for Private and Hybrid Clouds
Building Blocks for Private and Hybrid CloudsRightScale
 

La actualidad más candente (19)

Effective Linux Migration Processes
Effective Linux Migration ProcessesEffective Linux Migration Processes
Effective Linux Migration Processes
 
Realizing the Promise of the Cloud
Realizing the Promise of the CloudRealizing the Promise of the Cloud
Realizing the Promise of the Cloud
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the Couch
 
Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access Solution
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyLessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
 
Novell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedtNovell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedt
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
How to Maintain Software Appliances
How to Maintain Software AppliancesHow to Maintain Software Appliances
How to Maintain Software Appliances
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenApp
 
Building Blocks for Private and Hybrid Clouds
Building Blocks for Private and Hybrid CloudsBuilding Blocks for Private and Hybrid Clouds
Building Blocks for Private and Hybrid Clouds
 

Destacado

2012 october-1-boe-child-abuse
2012 october-1-boe-child-abuse2012 october-1-boe-child-abuse
2012 october-1-boe-child-abuseLadystellas
 
BG Staffing is HIRING!
BG Staffing is HIRING!BG Staffing is HIRING!
BG Staffing is HIRING!Joan Tucker
 
Novell GroupWise: Partner Success
Novell GroupWise: Partner SuccessNovell GroupWise: Partner Success
Novell GroupWise: Partner SuccessNovell
 
Zion’s christian soldiers 2
Zion’s christian soldiers 2Zion’s christian soldiers 2
Zion’s christian soldiers 2John Hubers
 
Best Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxBest Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxNovell
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVA
 
Mother India ka Birthday
Mother India ka BirthdayMother India ka Birthday
Mother India ka BirthdayKheyati Kishore
 
Novell Access Governance Suite
Novell Access Governance SuiteNovell Access Governance Suite
Novell Access Governance SuiteNovell
 
Novell filr 1.1 whats new (English)
Novell filr 1.1 whats new (English)Novell filr 1.1 whats new (English)
Novell filr 1.1 whats new (English)GWAVA
 
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...Novell
 
How to Build Smarter Decision Models Capable To Make Optimal Decisions
How to Build Smarter Decision Models Capable To Make Optimal DecisionsHow to Build Smarter Decision Models Capable To Make Optimal Decisions
How to Build Smarter Decision Models Capable To Make Optimal DecisionsJacob Feldman
 
Osmania University Mba syllabus 2013
Osmania University Mba syllabus 2013Osmania University Mba syllabus 2013
Osmania University Mba syllabus 2013Osmania University
 
Cheque Book Request Letter Format
Cheque Book Request Letter FormatCheque Book Request Letter Format
Cheque Book Request Letter FormatYour HR World
 

Destacado (15)

2012 october-1-boe-child-abuse
2012 october-1-boe-child-abuse2012 october-1-boe-child-abuse
2012 october-1-boe-child-abuse
 
BG Staffing is HIRING!
BG Staffing is HIRING!BG Staffing is HIRING!
BG Staffing is HIRING!
 
Novell GroupWise: Partner Success
Novell GroupWise: Partner SuccessNovell GroupWise: Partner Success
Novell GroupWise: Partner Success
 
Fake malware and virus scanners
Fake malware and virus scannersFake malware and virus scanners
Fake malware and virus scanners
 
Zion’s christian soldiers 2
Zion’s christian soldiers 2Zion’s christian soldiers 2
Zion’s christian soldiers 2
 
Best Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxBest Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on Linux
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
 
Mother India ka Birthday
Mother India ka BirthdayMother India ka Birthday
Mother India ka Birthday
 
Novell Access Governance Suite
Novell Access Governance SuiteNovell Access Governance Suite
Novell Access Governance Suite
 
Novell filr 1.1 whats new (English)
Novell filr 1.1 whats new (English)Novell filr 1.1 whats new (English)
Novell filr 1.1 whats new (English)
 
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
 
How to Build Smarter Decision Models Capable To Make Optimal Decisions
How to Build Smarter Decision Models Capable To Make Optimal DecisionsHow to Build Smarter Decision Models Capable To Make Optimal Decisions
How to Build Smarter Decision Models Capable To Make Optimal Decisions
 
Osmania University Mba syllabus 2013
Osmania University Mba syllabus 2013Osmania University Mba syllabus 2013
Osmania University Mba syllabus 2013
 
Install Guide
Install GuideInstall Guide
Install Guide
 
Cheque Book Request Letter Format
Cheque Book Request Letter FormatCheque Book Request Letter Format
Cheque Book Request Letter Format
 

Similar a Archiving and e-Discovery for Novell GroupWise

Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information GovernanceEliseT2015
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate wayvfmindia
 
Investigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationInvestigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationAndrew Case
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's IncSplunk
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
 
Defcon 23 - damon small - beyond the scan
Defcon 23 - damon small - beyond the scanDefcon 23 - damon small - beyond the scan
Defcon 23 - damon small - beyond the scanFelipe Prado
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
Skeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited ApplicationsSkeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited ApplicationsDenim Group
 
Computer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgComputer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgEric Vanderburg
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVA
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationAmy Larrimore
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 

Similar a Archiving and e-Discovery for Novell GroupWise (20)

Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Investigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationInvestigating Cooridinated Data Exfiltration
Investigating Cooridinated Data Exfiltration
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Defcon 23 - damon small - beyond the scan
Defcon 23 - damon small - beyond the scanDefcon 23 - damon small - beyond the scan
Defcon 23 - damon small - beyond the scan
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Skeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited ApplicationsSkeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited Applications
 
Computer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgComputer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric Vanderburg
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 

Archiving and e-Discovery for Novell GroupWise

  • 1. CL109 Archiving and e-Discovery for Novell GroupWise Jim F. Lundberg Vice President, Legal Novell, Inc. Travis Grandpre Product Marketing Manager Novell, Inc.
  • 2. Why are Archiving and e-Discovery Issues Becoming More Significant? • Legislation and Other Rules – HIPAA – SOX – GLB – FRCP • Recessionary Times – Cost cutting across all Corporate Budgets – Fortune 500 impact 2 © Novell, Inc. All rights reserved.
  • 3. Email Life Cycle – Creation • SOX – Demonstrate origination from a specific person • HIPAA – Protect against unauthorized access and include necessary disclaimers • Outside messages require inbound verification and protection to avoid inappropriate content or security risks 3 © Novell, Inc. All rights reserved.
  • 4. Email Life Cycle – Distribution • HIPAA – Must prevent unintended distribution of health information • GLB - Must prevent unintended distribution of confidential personal financial information • SOX – Audit capabilities of distribution • Protecting against unauthorized distribution of trade secrets or confidential information 4 © Novell, Inc. All rights reserved.
  • 5. Email Life Cycle – Retention • HIPAA, GLB – Requires protection against unauthorized access • HIPAA, SOX, Litigation – Ability to search and retrieve. • Litigation & audit - Protect against deletion or loss during. 5 © Novell, Inc. All rights reserved.
  • 6. Email Policy Considerations • Identity verification • Information protection • Content filtering • Archiving and preservation • Proof of compliance • Authentication • Virus and spam protection 6 © Novell, Inc. All rights reserved.
  • 7. Electronic Discovery Obligations Evolving Standards in Litigation – New Cases Every Day (e.g. The Pension Committee of the Univ. of Montreal, et. al. v. Banc of Am. Securities, LLC, et.al.) – Duty to preserve arises “once a party reasonably anticipates litigation”. – “Failure to preserve evidence resulting in the loss or destruction of relevant information is surely negligent and may be grossly negligent or willful”. – “Gross Negligence” where there was “no evidence that the defendants did anything to stop routine destruction”. – “Gross Negligence” where loss of data due to unfamiliarity with retention policy. – Failure to collect or properly review can be grossly negligent or willful (includes former employees). 7 © Novell, Inc. All rights reserved.
  • 8. “Spoliation” • “Spoliation refers to the destruction or alteration of evidence.” • Courts have inherent power to impose sanctions for spoliation. • Sanctions include: – Fines or “cost shifting” – Evidence Preclusion – Adverse Inference - “presume lost data was favorable to opposition's case” – Dismissal or Default Judgment • Severity of Sanction is generally based on the Judge's determination of party's negligence and relevance of data. 8 © Novell, Inc. All rights reserved.
  • 9. Electronic Discovery Process • Identification • Preservation • Collection • Review • Forensic data analysis • Production *In 2008 - Fortune 500 companies estimated cost of litigation at $210 Billion (1/3 of after tax profit for that year) 9 © Novell, Inc. All rights reserved.
  • 10. Identification • What machines are connected to a network? • Ability to identify individual files contained in email system • Identifying requested information (ie.. file type, creator, custodians, access dates, keywords) 10 © Novell, Inc. All rights reserved.
  • 11. Preservation • Files and metadata • Tracking preservation requests - “Litigation holds” • “Holding in place” or “Copying to secure repository” 11 © Novell, Inc. All rights reserved.
  • 12. Collection • Automation vs. Custodian directed • If responsive – requires copying for processing. • Collection reports and logs • Preserve integrity of metadata 12 © Novell, Inc. All rights reserved.
  • 13. Review • Inclusion vs. Exclusion • Search capabilities – Identification – Recognition – Bates Numbering – Categorization – Privileges – Redaction – Work product – Native File Format viewers – Attorney-Client – Exporting to various formats – Confidentiality) – litigation support databases or other review products 13 © Novell, Inc. All rights reserved.
  • 14. Forensic Data Analysis • Metadata • Custodian access • Analysis of multiple repositories 14 © Novell, Inc. All rights reserved.
  • 15. Production • Electronic files vs. Hard Documents • Native format • Other format (ie. XML) 15 © Novell, Inc. All rights reserved.
  • 16. Q&A
  • 17. Partner Solutions 17 © Novell, Inc. All rights reserved.
  • 18.
  • 19. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.