Era of Electronic Discovery Drives Need for Data Management Today’s technology has created information overload for companies worldwide. We are inundated with digital data every day. In a recent study, research firm IDC reports electronic information created and replicated within the workplace is growing at a faster pace than any other segment of the digital universe. According to the IDC, about 25 percent of the data generated last year, both original and copied, came from the business world. By 2010, IDC predicts that portion will increase to 30 percent. As this influx of data continues to rise, so does the number of lawsuits filed in Michigan each year. Currently, the state averages a total of 121,000 new lawsuits annually. What do these two issues have in common? Plenty, when you consider how recent amendments to the Federal Rules for Civil Procedure (FRCP) change the way businesses must store and manage electronic data. When litigation ensues, all electronic data is discoverable and can pose two significant problems for businesses: discoverable data can provide a goldmine of information to the opposing side and complying with court ordered disclosure of information can be time consuming and expensive absent proper retention and storage systems. Under the new rules, discoverable data required in litigation must be identified within 99 days. According to a recent Pike & Fischer report, 93 percent of companies in the U.S. are not prepared to meet this demand. Non-compliance can be costly – businesses may face sanctions, summary judgments or dismissals. Mitigating the risk To create this policy, companies must first ask some key questions, including:
Developing the policy involves classifying information and, based on these classifications, documenting retention, organization, destruction and preservation policies. Next steps include staff notification and training and implementing technology strategies for automation and processes for ongoing data classification and management. Automated data management is the final step and vital to this process. At this point, organizations must ensure all relevant electronic information is preserved and more importantly, easily accessed. Where is my data? Businesses store massive amounts of digital data, including email, voicemail, instant message logs and internal documents on computer networks and individual hard drives. Implementing an Information Lifecycle Management (ILM) strategy brings order to this ever-expanding mass of information. ILM is a combination of policies, procedures, tools and practices that help organizations align the cost of a business technology infrastructure and the value of the data that infrastructure is managing. The value of information is greatest at the time it’s created. Over time, its relevance diminishes but the maintenance costs continue to grow. Typically, most data loses its value after six months and much of the information we store expires its worth after 12 months. Yet, businesses expend significant corporate resources to store this data year after year. Using an automated process to manage and store information can lead to reduced risks and costs associated with electronic discovery. Some additional key benefits include the ability to:
Leverage technology, lower cost ILM has become a best practice in the business world. In addition to its applications for legal discovery, it encompasses many of today’s most pertinent business and technology issues such as corporate and regulatory compliance, storage efficiency, and disaster recovery. Regardless of the situation, having an ILM strategy in place allows companies to efficiently transport, store, secure, replicate and access crucial information – all critical to sound business management in today’s Information Age. Brian Young is a senior account manager with Trivalent Group, a leading technology firm based in Grandville, Mich. |
UPCOMING VIRTUAL EVENTS
Demystifying Cyber Security for SMBs
The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.
SESSION 4: Cyber Security Strategy
Watch On-Demand
SESSION 5: Cyber Insurance & MFA
Watch On-Demand
SESSION 6: Threat Detection | JAN. 15
Microsoft Copilot
Master Class Workshop
eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.
In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.
RESOURCES
Cyber Security Awareness Hub
Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.
We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.
Resource Library
Insights to help you do what you do better, faster and more profitably.
> Tips to Stay Protected Against Phishing Attacks
> Understanding Ransomware
> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them
> Practical Advice for Avoiding Phishing Emails
NEWSLETTER
"*" indicates required fields