SlideShare una empresa de Scribd logo
1 de 21
Managing E-Discovery Risks: What You Don’t Know  Can  Hurt You! Practical Steps for Risk Managers to Gain Control of Electronically Stored Information Before and During Litigation REBEX Conference October 24, 2008  11:30 a.m. Fred Travis, Principal Risk Management Consulting [email_address]
Scope of the ESI Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-Discovery Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Spoilation & Sanctions ,[object Object],[object Object],[object Object],[object Object]
ESI Issues & Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Risk Management Questions About e-Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
RM Questions About ESI Controls & Assessments ,[object Object],[object Object],[object Object]
ESI Risk Management Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management Steps  for ESI Compliance ,[object Object],[object Object],[object Object],[object Object]
Electronic Document Retention Policies & Procedures ,[object Object],[object Object],[object Object],[object Object]
Critical ESI Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object]
ESI Preservation ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Legal Hold” Policy & Procedures ,[object Object],[object Object],[object Object]
“ Legal Hold” Policy & Procedures ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Risk Management Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Bottom Line ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QUESTIONS?

Más contenido relacionado

La actualidad más candente

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
Recommind
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Kym Canty
 

La actualidad más candente (20)

Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
 
Oracle EBS Data Risks During a Divestiture
Oracle EBS Data Risks During a DivestitureOracle EBS Data Risks During a Divestiture
Oracle EBS Data Risks During a Divestiture
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Preparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA AuditPreparing & Responding to an OCR HIPAA Audit
Preparing & Responding to an OCR HIPAA Audit
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
Managing Organizational Risk: The Mighty Triad of Internal Audit, Compliance,...
 
Preparing for the Worst: Confronting Organizational Risk with Training Strategy
Preparing for the Worst: Confronting Organizational Risk with Training StrategyPreparing for the Worst: Confronting Organizational Risk with Training Strategy
Preparing for the Worst: Confronting Organizational Risk with Training Strategy
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
Role management
Role managementRole management
Role management
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 

Similar a E Discovery V2.Pdf

E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk Managers
Fred Travis
 
EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project plan
Donna_Maree_Findlay
 
Compliance Internal Investigation
Compliance Internal Investigation Compliance Internal Investigation
Compliance Internal Investigation
Nexsen Pruet
 
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docxCHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
mccormicknadine86
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
susanschei
 

Similar a E Discovery V2.Pdf (20)

E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk Managers
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
2009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 1102009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 110
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project plan
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Breach response
Breach responseBreach response
Breach response
 
Compliance Internal Investigation
Compliance Internal Investigation Compliance Internal Investigation
Compliance Internal Investigation
 
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
 
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docxCHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
CHAPTER 8INFORMATION GOVERNANCEInformation Governance & .docx
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity Clients
 

Último

VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdfShrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 

E Discovery V2.Pdf

  • 1. Managing E-Discovery Risks: What You Don’t Know Can Hurt You! Practical Steps for Risk Managers to Gain Control of Electronically Stored Information Before and During Litigation REBEX Conference October 24, 2008 11:30 a.m. Fred Travis, Principal Risk Management Consulting [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.

Notas del editor

  1. Good morning. The subtitle of this presentation should probably be : You have Mail – Way too much! Or, how about “How Your Search System Could keep you out of Jail”. Both are the titles of recent articles on the subject of e-Discovery. Because of recent changes in Federal Discovery rules, that Patrick has explained, it is now imperative that organizations get control of their email, Microsoft Office documents and other electronic materials, before unanticipated discovery demands lead to huge expenses and possible fines, penalties and adverse judgments. Hopefully, we will give you a starting point for practical steps you can take at your organizations to create, execute and maintain plans and actions to reduce risks and gain control over the ever-expanding morass of electronic information. Fred Travis, Principal Consultant Risk Management Consulting REBEX: Managing e-Discovery Risks October 24, 2008