Disclosure to Data Breach: Details Matter in eDiscovery
How one lawyer's mistake cost Wells Fargo reputational and financial harm because items were not reviewed before they were sent to the plaintiff. Learn how you can avoid these mistakes by setting up an efficient and effective review.1.7KViews4likes0CommentsDoes anyone actually use EV.cloud or just the on premise EV?
I am researching an email archiving system for my company. Our reseller recommends EV. I agree that EV is a great enterprise level product but feel it might be too high end for our medium sized company. I am hesitant to deploy it due to the complexity as well as the high system requirements. We would end up with more EV servers than we have Exchange servers, which just seems crazy to me. We only have 2 on premise Exchange servers with less than 400 mailboxes and our total amount of email including journaled archives is around 12 TB. With that being said, I am interested in EV.cloud especially since it says no required hardware, software or client plug-ins are needed. However, in checking, there is very little information on EV.cloud. There have only been 29 threads created in a 2 year period with one of them asking how to move away from it. The consulting companies don't seem to have the experience or knowledge that they have with the on premise version. Is the product any good? I know Symantec's marketing makes it out to be a great product but would really like to hear of real world customer experience. Thank you.Solved3.6KViews3likes7CommentsDefensible Deletion: The Cornerstone of Intelligent Information Governance
The struggle to stay above the rising tide of information is a constant battle for organizations. Not only are the costs and logistics associated with data storage more troubling than ever, but so are the potential legal consequences. Indeed, the news headlines are constantly filled with horror stories of jury verdicts, court judgments and unreasonable settlements involving organizations that failed to effectively address their data stockpiles. While there are no quick or easy solutions to these problems, an ever increasing method for effectively dealing with these issues is through an organizational strategy referred to as defensible deletion. A defensible deletion strategy could refer to many items. But at its core, defensible deletion is a comprehensive approach that companies implement to reduce the storage costs and legal risks associated with the retention of electronically stored information (ESI). Organizations that have done so have been successful in avoiding court sanctions while at the same time eliminating ESI that has little or no business value. The first step to implementing a defensible deletion strategy is for organizations to ensure that they have a top-down plan for addressing data retention. This typically requires that their information governance principals – legal and IT – are cooperating with each other. These departments must also work jointly with records managers and business units to decide what data must be kept and for what length of time. All such stakeholders in information retention must be engaged and collaborate if the organization is to create a workable defensible deletion strategy. Cooperation between legal and IT naturally leads the organization to establish records retention policies, which carry out the key players’ decisions on data preservation. Such policies should address the particular needs of an organization while balancing them against litigation requirements. Not only will that enable a company to reduce its costs by decreasing data proliferation, it will minimize a company’s litigation risks by allowing it to limit the amount of potentially relevant information available for current and follow-on litigation. In like manner, legal should work with IT to develop a process for how the organization will address document preservation during litigation. This will likely involve the designation of officials who are responsible for issuing a timely and comprehensive litigation hold to custodians and data sources. This will ultimately help an organization avoid the mistakes that often plague document management during litigation. The Role of Technology in Defensible Deletion In the digital age, an essential aspect of a defensible deletion strategy is technology. Indeed, without innovations such as archiving software and automated legal hold acknowledgements, it will be difficult for an organization to achieve its defensible deletion objectives. On the information management side of defensible deletion, archiving software can help enforce organization retention policies and thereby reduce data volume and related storage costs. This can be accomplished with classification tools, which intelligently analyze and tag data content as it is ingested into the archive. By so doing, organizations may retain information that is significant or that otherwise must be kept for business, legal or regulatory purposes – and nothing else. An archiving solution can also reduce costs through efficient data storage. By expiring data in accordance with organization retention policies and by using single instance storage to eliminate ESI duplicates, archiving software frees up space on company servers for the retention of other materials and ultimately leads to decreased storage costs. Moreover, it also lessens litigation risks as it removes data available for future litigation. On the eDiscovery side of defensible deletion, an eDiscovery platform with the latest in legal hold technology is often essential for enabling a workable litigation hold process. Effective platforms enable automated legal hold acknowledgements on various custodians across multiple cases. This allows organizations to confidently place data on hold through a single user action and eliminates concerns that ESI may slip through the proverbial cracks of manual hold practices. Organizations are experiencing every day the costly mistakes of delaying implementation of a defensible deletion program. This trend can be reversed through a common sense defensible deletion strategy which, when powered by effective, enabling technologies, can help organizations decrease the costs and risks associated with the information explosion.1.1KViews1like10CommentsDistribution List members at time of the email Discovered
Hi, Using Discovery Accelerator 9 we are reviewing an eMail that was sent to a Distribution List. We need to know the members of that Distribution List at the time of the email being sent\received. When exporting the email and clicking on the Distribution List it is resolving against our current Active Directory membership and returning Mailboxes that weren't even created at the time of the email discovered, being sent. Thanks in advance, Cheers, PhilSolved2.2KViews1like8CommentsUnable to open some items via the web app: Failed to get the document from the Storage Service
EV 11.0.1 + CHF2 Windows 2008 R2 Intermittently we're seeing the error "Failed to get the document from the Storage Service" when viewing items and attachments in the web app. We can use 'View Whole Item', no problem. I'm not sure what's going on with the web app. There aren't any errors reported in the Event logs when this problem occurs but I do see this in the IIS logs: 2015-08-20 14:02:00 GET /EnterpriseVault/properties.asp VaultID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&PVID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&SavesetID=XXXXXXXXXXXXXXX%7EXXXXXXXXXXXXXXXXXX%7EZ%7EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&attachment=1|-|ASP_0147|500_Server_Error 80 DDD\UNAMEXXX Mozilla/4.0+(compatible;+MSIE+8.0;+Windows+NT+6.1;+WOW64;+Trident/4.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+.NET4.0C;+.NET4.0E) 500 0 64 25178 2015-08-20 14:02:00 GET /EnterpriseVault/properties.asp VaultID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&PVID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&SavesetID=XXXXXXXXXXXXXXX%7EXXXXXXXXXXXXXXXXXX%7EZ%7EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&attachment=1|-|ASP_0147|500_Server_Error 80 DDD\UNAMEXXX Mozilla/4.0+(compatible;+MSIE+8.0;+Windows+NT+6.1;+WOW64;+Trident/4.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+.NET4.0C;+.NET4.0E) 500 0 64 24726 2015-08-20 14:02:00 GET /EnterpriseVault/properties.asp VaultID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&PVID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&SavesetID=XXXXXXXXXXXXXXX%7EXXXXXXXXXXXXXXXXXX%7EZ%7EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&attachment=1|-|ASP_0147|500_Server_Error 80 DDD\UNAMEXXX Mozilla/4.0+(compatible;+MSIE+8.0;+Windows+NT+6.1;+WOW64;+Trident/4.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+.NET4.0C;+.NET4.0E) 500 0 64 10998 2015-08-20 14:02:00 GET /EnterpriseVault/properties.asp VaultID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&PVID=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXvault&SavesetID=XXXXXXXXXXXXXXX%7EXXXXXXXXXXXXXXXXXX%7EZ%7EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&attachment=1|-|ASP_0147|500_Server_Error 80 DDD\UNAMEXXX Mozilla/4.0+(compatible;+MSIE+8.0;+Windows+NT+6.1;+WOW64;+Trident/4.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+.NET4.0C;+.NET4.0E) 500 0 64 10608 Has anybody seen this "ASP_0147|500_Server_Error" before or have an idea on why I'm seeing it? Some of the info I've come across on the web says it could be a "resource problem" but nothing has been real helpful in getting to the bottom of this.1.8KViews1like3Comments