203 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 2
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 7
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 3
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 4
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1
Top 10
Cloud Computing: Is the Risk Worth the Reward?
Fri, May 2nd 2014 8
Off the topic: Become a tailgating all-star
Thu, Nov 5th 2015 8
Top 10 Horror Movies for Halloween
Thu, Oct 29th 2015 7
Important Exchange 2016 Information for Mail Attender Clients
Tue, Nov 3rd 2015 7
Off-the-topic: 5 Winter Getaway Ideas
Tue, Feb 9th 2016 7
How IT can take the lead in Information Governance projects
Wed, Apr 20th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 7
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
White Paper: Implementing an Information Governance Program
Thu, Apr 3rd 2014 6
From LotusScript to Java: Part 3
Fri, May 2nd 2014 6


How to Survive Data Discovery in the Digital age
Twitter Google+ Facebook LinkedIn Addthis Email Gmail Flipboard Reddit Tumblr WhatsApp StumbleUpon Yammer Evernote Delicious
Jeff Tujetsch    

eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’.

Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness, we are not alone. Many other countries are following our lead and performing eDiscovery on whatever data can be searched. Regardless of the reason for eDiscovery (legal, HR, public records, etc.), eDiscovery is an extremely important tool for almost any business and many times usurps the priorities of other tasks that employees are performing. So not only is it important, but highly visible.

So why is it so difficult? Two of the prominent reasons are;

  1. Data disparity
  2. Location

No data is alike which makes eDiscovery much more difficult and it’s never where it’s supposed to be or more importantly, it’s never only where it’s supposed to be. Meaning, data becomes distributed, which then makes it exponentially harder to discover.

Infographic: Download Your Copy of Our Latest and Most Popular Survey Results on eDiscovery

Data disparity

First, let’s talk about disparity. Did you know when trains and tracks were first proliferating across America between the 1830s and 1850s that there were different gauges (widths) being used everywhere. The effect of this was trains couldn’t travel between states. The reason this became a problem was lack of foresight and communication. The states didn’t even consider talking to each other about standardizing a gauge. They were inward-focused and were resolving their own problem.

The same is true for data. Even though we have some of the most brilliant technicians, they are usually inward focused. Building their own software, proprietarily storing their own data. That’s great for them, but becomes a nightmare when eDiscovery is needed. Just like the track gauges, there is no easy way to ‘travel’ between data. This means that those of you tasked with performing eDiscovery need to adapt.

Survival tip #1: Don’t think this all falls on you

One person can’t possibly know all types of data and where they are stored. You will need to have a team of people that can help inventory your data and make determinations of what is the most high-risk, meaning what data is most applicable to eDiscovery. One of the biggest challenges to eDiscovery is that it is reactive. Although you cannot plan when it will occur, you can do everything in your power to be prepared as possible, by analyzing your infrastructure. It is best to have a plan that is ready to be executed when eDiscovery requests occur. This also includes having the necessary tools to help automate your eDiscovery process. If you are not automating the eDiscovery process, you could be setting yourself up for failure. Could the eDiscovery process be performed manually? Yes, but not efficiently, not effectively, and not within the typical time-constraints.

Think of automating eDiscovery like car insurance. You don’t buy insurance after you have an accident. You buy it when you purchase your car and are prepared to use it when the time arises, even though you typically don’t know when that will be. With eDiscovery some of the best advice I can offer is be prepared. Don’t be reacting when legal is calling.

Data distribution

The other major challenge of eDiscovery is distributed data. What I mean by that is data isn’t only where it’s supposed to be. Many times it gets distributed physically (e.g. paper) but also electronically (e.g. thumb drives, etc.). This is where you could drive yourself crazy.

Survival tip #2: Determine where you need to search

Trying to prevent data from leaving your organization is virtually impossible. Just think of the ways data can travel and it might make you shudder. What you need to do is think strategically and focus on where you know the data is stored. However, you also need to make the ‘powers that be’ aware of your concerns. This will allow them to make informed decisions regarding the information you provided. For instance, they could make a company policy on printing emails or copying data to thumb drives, etc. This will not only relieve you of the responsibility of this distributed, but also once again, allow you to focus only on where the data should be.

In summary, you can survive eDiscovery, but only if you are ready for it and I hope you use the survival tips provided. As the famous saying goes, ‘Fail to plan, plan to fail!’

 

Download our white paper, “Introduction to PCI and PII: Securing Your Organization’s Data”

PCI-PII-CTA

The post How to Survive Data Discovery in the Digital age appeared first on Sherpa Software.



---------------------
http://www.sherpasoftware.com/blog/survive-data-discovery-digital-age/
May 09, 2016
3 hits



Recent Blog Posts
2
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2:25p   Jeff Tujetsch
Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two major players being software and people. In this article, I will try to expose possible issues that you can hopefully avoid. For those of you that have had school-age kids, you can attest to the kids succeeding more when a routine is established and followed. So why am I talking about routine? Beca
2
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 1:21p   Marta Farensbach
Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit card numbers, social security numbers, social insurance information, and health care records. As described in a previous blog article, having this Personally Identifiable information (PII) or Payment Card Industry (PCI) data loose in your system can cause all kinds trouble, ranging from fi
3
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 4:25p   Harvey Coblin
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees can work where and when they please and with hardware and applications they are already familiar with. It is estimated worldwide that one in three employees are utilizing personal devices at the
1
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1:13p   Rick Wilson
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding data protection regulation with the EU. It was adopted by the European Parliament Council and Commission in 2015, took effect in 2016 and enforcement is scheduled to begin in May of 2018. At its core, the GDPR is intended to provide citizens of the EU with greater control over their personal data
0
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 6:04p   Marta Farensbach
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a strong Information Governance (IG) platform, can introduce substantial risk into your organization. In the worst cases, data breaches, adverse judgements, or non-compliance penalties could thrust a company into the glare of national headlines. Poor policy can affect more than just the finances of a
0
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 2:06p   Rick Wilson
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President Lyndon B. Johnson to establish a process whereby citizens can request copies of governmental records that are not published in the Federal Registry. Agencies, in turn, are required to provide this information in a timely fashion (usually 20 days). Although FOIA is a federal mandate, it has also
1
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 2:10p   Harvey Coblin
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in part to the fact that cybercrime can come in many forms, ranging from denial of service, theft of credit card or other financial information  (PCI/PII), industrial espionage, all the way up the ladder to state-sponsored terroris
1
How to Survive Data Discovery in the Digital Age
Wed, May 18th 2016 12:42p   Jeff Tujetsch
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’. Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness,
0
Information Governance and the Internet of Things
Wed, May 11th 2016 2:28p   Marta Farensbach
Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very simple level, the Internet of Things (IoT) describes the freeing of communication from the domain of computers and smart phones by allowing all types of devices to share information across the internet.  ‘Things’ like cars, fridges, health monitors, water meters and so much more can be empower
1
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 12:59p   bhat67i
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will learn:  Why Office 365 is a compelling platform, Examples of productivity integrations, About the importance of information governance integration, Supplementing with third party software Click here to download this white paper! The post WHITE PAPER: Implementing Office 365: Inherent Fea




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition