Storage

08:25 PM
Commentary
Commentary
Commentary
50%
50%
Repost This

The Many Benefits of E-Discovery

Enterprises are increasingly forming interdisciplinary teams to research e-discovery services and products

In a previous article, I referred to e-discovery as the pachyderm in the classic story of the blind men and the elephant. The men were attempting to describe the elephant solely by the single part that each was feeling. Of course, each described an animal that was most emphatically not an elephant.

The story fits e-discovery because so many people confidently talk about e-discovery as if it were one thing: the Federal Rules of Civil Procedure amendments, or court rulings, or review and analysis, or email searches. All of these things are involved in e-discovery, but e-discovery is much larger than the sum of these parts and many more.

Here is our definition of e-discovery: "E-discovery is the process of classifying, collecting, preserving, reviewing, and producing electronically stored information (ESI)." This definition references e-discovery's major pain point: litigation. But this e-discovery definition is not limited to litigation. That is because the same point points -- and the same solutions -- benefit not only the litigation e-discovery process, but also compliance and even storage management. Essentially, e-discovery tools and best practices impact any business process that depends on visibility and control over ESI.

The most-affected workgroups here are Legal (i.e. the General Counsel's office); the governance, risk, and compliance folks (GRC); and IT, which must manage all of that data that legal and GRC are desperately trying to search.

E-discovery and Legal: This is the classic use of e-discovery tools and its biggest development driver. Legal has used review and analysis software for years, but these packages are developing analytics to reach further back in the e-discovery cycle. The earlier that review and analysis can produce workable results sets, the more cost-effective litigation e-discovery becomes.

Previous
1 of 3
Next
Comment  | 
Print  | 
More Insights
More Blogs from Commentary
Edge Devices Are The Brains Of The Network
In any type of network, the edge is where all the action takes place. Think of the edge as the brains of the network, while the core is just the dumb muscle.
SDN: Waiting For The Trickle-Down Effect
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
IT Certification Exam Success In 4 Steps
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
VMware's VSAN Benchmarks: Under The Hood
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
Building an Information Security Policy Part 4: Addresses and Identifiers
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
Hot Topics
3
Converged Infrastructure: 3 Considerations
Bill Kleyman, National Director of Strategy & Innovation, MTM Technologies,  4/16/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed