Summary
It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.
In this Practice Guide
- The relative merits of common security compliance frameworks
- The pros and cons of cloud and on-premises storage environments
- The essential need for data encryption at rest and in transit
Key Insights
- The need for everyone to contribute to data protection
- The critical importance of role-based access control
- The need to adapt to evolving threat tactics
Practice Guide Download
About the Authors
From the author
Keep Calm and CAL On: Key Decisions about Continuous Active Learning
On any new matter, an eDiscovery professional must assess the project’s goals and whether CAL can be leveraged to help achieve those goals. When considering CAL, there are three main decision points: deciding whether to use CAL, deciding how to use CAL, and deciding when your CAL process is complete.
ED105 – Clearing the Fog of War: ECA Fundamentals
The fog of war is apt shorthand for the state of uncertainty that exists early in a new legal matter: What are the facts? What are the risks? What evidence exists, and what does it show? Early case assessment (ECA) is how we start to answer those questions.