SlideShare a Scribd company logo
CL109
Archiving and e-Discovery
for Novell GroupWise




Jim F. Lundberg
Vice President, Legal
Novell, Inc.



Travis Grandpre
Product Marketing Manager
Novell, Inc.
Why are Archiving and e-Discovery
    Issues Becoming More Significant?
    •   Legislation and Other Rules
        –   HIPAA
        –   SOX
        –   GLB
        –   FRCP
    •   Recessionary Times
        –   Cost cutting across all Corporate Budgets
        –   Fortune 500 impact




2   © Novell, Inc. All rights reserved.
Email Life Cycle – Creation

    •   SOX – Demonstrate origination from a specific person
    •   HIPAA – Protect against unauthorized access and
        include necessary disclaimers
    •   Outside messages require inbound verification and
        protection to avoid inappropriate content or security
        risks




3   © Novell, Inc. All rights reserved.
Email Life Cycle – Distribution

    •   HIPAA – Must prevent unintended distribution of health
        information
    •   GLB - Must prevent unintended distribution of
        confidential personal financial information
    •   SOX – Audit capabilities of distribution
    •   Protecting against unauthorized distribution of trade
        secrets or confidential information




4   © Novell, Inc. All rights reserved.
Email Life Cycle – Retention

    •   HIPAA, GLB – Requires protection against
        unauthorized access
    •   HIPAA, SOX, Litigation – Ability to search and retrieve.
    •   Litigation & audit - Protect against deletion or loss
        during.




5   © Novell, Inc. All rights reserved.
Email Policy Considerations

    •   Identity verification
    •   Information protection
    •   Content filtering
    •   Archiving and preservation
    •   Proof of compliance
    •   Authentication
    •   Virus and spam protection




6   © Novell, Inc. All rights reserved.
Electronic Discovery Obligations
    Evolving Standards in Litigation
         –   New Cases Every Day (e.g. The Pension Committee of the
             Univ. of Montreal, et. al. v. Banc of Am. Securities, LLC, et.al.)
         –   Duty to preserve arises “once a party reasonably anticipates
             litigation”.
         –   “Failure to preserve evidence resulting in the loss or destruction
             of relevant information is surely negligent and may be grossly
             negligent or willful”.
         –   “Gross Negligence” where there was “no evidence that the
             defendants did anything to stop routine destruction”.
         –   “Gross Negligence” where loss of data due to unfamiliarity with
             retention policy.
         –   Failure to collect or properly review can be grossly negligent or
             willful (includes former employees).
7   © Novell, Inc. All rights reserved.
“Spoliation”

    •   “Spoliation refers to the destruction or alteration of evidence.”
    •   Courts have inherent power to impose sanctions for spoliation.
    •   Sanctions include:
         –   Fines or “cost shifting”
         –   Evidence Preclusion
         –   Adverse Inference - “presume lost data was favorable to
             opposition's case”
         –   Dismissal or Default Judgment
    •   Severity of Sanction is generally based on the Judge's
        determination of party's negligence and relevance of data.




8   © Novell, Inc. All rights reserved.
Electronic Discovery Process

    •   Identification
    •   Preservation
    •   Collection
    •   Review
    •   Forensic data analysis
    •   Production

    *In 2008 - Fortune 500 companies estimated cost of litigation at $210 Billion (1/3 of
    after tax profit for that year)




9   © Novell, Inc. All rights reserved.
Identification

     •   What machines are connected to a network?
     •   Ability to identify individual files contained in email
         system
     •   Identifying requested information (ie.. file type, creator,
         custodians, access dates, keywords)




10   © Novell, Inc. All rights reserved.
Preservation

     •   Files and metadata
     •   Tracking preservation requests - “Litigation holds”
     •   “Holding in place” or “Copying to secure repository”




11   © Novell, Inc. All rights reserved.
Collection

     •   Automation vs. Custodian directed
     •   If responsive – requires copying for processing.
     •   Collection reports and logs
     •   Preserve integrity of metadata




12   © Novell, Inc. All rights reserved.
Review

     •   Inclusion vs. Exclusion           •   Search capabilities
          –   Identification                   –   Recognition
          –   Bates Numbering                  –   Categorization
          –   Privileges                       –   Redaction
          –   Work product                     –   Native File Format viewers
          –   Attorney-Client                  –   Exporting to various formats
          –   Confidentiality)                     – litigation support
                                                   databases or other review
                                                   products




13   © Novell, Inc. All rights reserved.
Forensic Data Analysis

     •   Metadata
     •   Custodian access
     •   Analysis of multiple repositories




14   © Novell, Inc. All rights reserved.
Production

     •   Electronic files vs. Hard Documents
     •   Native format
     •   Other format (ie. XML)




15   © Novell, Inc. All rights reserved.
Q&A
Partner Solutions




17   © Novell, Inc. All rights reserved.
Archiving and e-Discovery for Novell GroupWise
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

PDF
Using Hard Disk Encryption and Novell SecureLogin
PDF
Consolidation Planning: Getting the Most from Your Virtualization Initiative
PPT
Installing and Configuring Novell Conferencing
PDF
Migrate from Red Hat to SUSE Linux Enterprise Server
PDF
Novell ZENworks Overview and Futures
PDF
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
PDF
Implementing and Proving Compliance Tactics with Novell Compliance Management...
PDF
Novell iPrint: Advanced Features on Linux
Using Hard Disk Encryption and Novell SecureLogin
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Installing and Configuring Novell Conferencing
Migrate from Red Hat to SUSE Linux Enterprise Server
Novell ZENworks Overview and Futures
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Novell iPrint: Advanced Features on Linux

What's hot (19)

PDF
Effective Linux Migration Processes
PDF
Realizing the Promise of the Cloud
PDF
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
PDF
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
PDF
Finding Virtual Coins in the Couch
PDF
Novell iFolder 3.8: A Simple, Secure File Access Solution
PDF
SUSE Linux Enterprise Server for System z SP1
PDF
Run Book Automation with PlateSpin Orchestrate
PDF
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
PDF
Novell filr customer slides richard lindstedt
PDF
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
PDF
How to Maintain Software Appliances
PDF
Applying Novell Identity Manager to Your Everyday Problems
PDF
Securing Your Cloud Applications with Novell Cloud Security Service
PDF
Accelerate to the Cloud
PDF
Integrating Apple Macs Using Novell Technologies
PDF
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
PDF
What's new in XenDesktop and XenApp
PPTX
Building Blocks for Private and Hybrid Clouds
Effective Linux Migration Processes
Realizing the Promise of the Cloud
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Finding Virtual Coins in the Couch
Novell iFolder 3.8: A Simple, Secure File Access Solution
SUSE Linux Enterprise Server for System z SP1
Run Book Automation with PlateSpin Orchestrate
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Novell filr customer slides richard lindstedt
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
How to Maintain Software Appliances
Applying Novell Identity Manager to Your Everyday Problems
Securing Your Cloud Applications with Novell Cloud Security Service
Accelerate to the Cloud
Integrating Apple Macs Using Novell Technologies
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
What's new in XenDesktop and XenApp
Building Blocks for Private and Hybrid Clouds
Ad

Viewers also liked (15)

PDF
2012 october-1-boe-child-abuse
PDF
BG Staffing is HIRING!
PDF
Novell GroupWise: Partner Success
PDF
Fake malware and virus scanners
PPTX
Zion’s christian soldiers 2
PDF
Best Practices for Novell GroupWise on Linux
PDF
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
PPTX
Mother India ka Birthday
PDF
Novell Access Governance Suite
PDF
Novell filr 1.1 whats new (English)
PDF
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
PDF
How to Build Smarter Decision Models Capable To Make Optimal Decisions
PDF
Osmania University Mba syllabus 2013
DOCX
DOC
Cheque Book Request Letter Format
2012 october-1-boe-child-abuse
BG Staffing is HIRING!
Novell GroupWise: Partner Success
Fake malware and virus scanners
Zion’s christian soldiers 2
Best Practices for Novell GroupWise on Linux
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
Mother India ka Birthday
Novell Access Governance Suite
Novell filr 1.1 whats new (English)
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
How to Build Smarter Decision Models Capable To Make Optimal Decisions
Osmania University Mba syllabus 2013
Cheque Book Request Letter Format
Ad

Similar to Archiving and e-Discovery for Novell GroupWise (20)

KEY
E-Discovert Ethhics CLE April 25 2010
KEY
E-Discovery Ethics CLE
PDF
Spoliation Wars & Other ESI Highlights (2010)
PDF
Implementing Distributed Novell Sentinel Environments: A Customer Case Study
PDF
Novell Tour Europe and South Africa 2012
PDF
Forensic data investigations in China
PDF
Novell ZENworks Diagnostic Center
PPTX
Effective Internal Investigations
PPTX
ACEDS-Stroock 9-4-14 Webcast Presentation
PDF
Information Explosion - Erik Moller
PPT
Document Retention Policies Intersect Electronic Discovery Obligations - by M...
PPTX
Novell Strategy Update June 2013
PPT
AAR Investigation Of Electronic Evidence
PDF
Novell Identity Manager Tips, Tricks and Best Practices
PDF
Integrating Novell Access Governance Suite with Novell Identity Manager
PPTX
Novell Filr Overview
PPTX
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
PDF
Cloud Computing for Lawyers- Chicago Bar Association Presentation
PDF
Practice Tips for Successful Discovery Projects
PDF
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
E-Discovert Ethhics CLE April 25 2010
E-Discovery Ethics CLE
Spoliation Wars & Other ESI Highlights (2010)
Implementing Distributed Novell Sentinel Environments: A Customer Case Study
Novell Tour Europe and South Africa 2012
Forensic data investigations in China
Novell ZENworks Diagnostic Center
Effective Internal Investigations
ACEDS-Stroock 9-4-14 Webcast Presentation
Information Explosion - Erik Moller
Document Retention Policies Intersect Electronic Discovery Obligations - by M...
Novell Strategy Update June 2013
AAR Investigation Of Electronic Evidence
Novell Identity Manager Tips, Tricks and Best Practices
Integrating Novell Access Governance Suite with Novell Identity Manager
Novell Filr Overview
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Practice Tips for Successful Discovery Projects
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...

More from Novell (20)

PDF
Filr white paper
PDF
Social media class 4 v2
PDF
Social media class 3
PDF
Social media class 2
PDF
Social media class 1
PDF
Social media class 2 v2
PDF
LinkedIn training presentation
PDF
Twitter training presentation
PDF
Getting started with social media
PDF
Strategies for sharing and commenting in social media
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PPT
Workload iq final
PDF
The Identity-infused Enterprise
PDF
Shining the Enterprise Light on Shades of Social
PDF
The New Business Value of Today’s Collaboration Trends
PDF
Preventing The Next Data Breach Through Log Management
PDF
Iaas for a demanding business
PDF
Workload IQ: A Differentiated Approach
PDF
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
PDF
IDC Says, Don't Move To The Cloud
Filr white paper
Social media class 4 v2
Social media class 3
Social media class 2
Social media class 1
Social media class 2 v2
LinkedIn training presentation
Twitter training presentation
Getting started with social media
Strategies for sharing and commenting in social media
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Workload iq final
The Identity-infused Enterprise
Shining the Enterprise Light on Shades of Social
The New Business Value of Today’s Collaboration Trends
Preventing The Next Data Breach Through Log Management
Iaas for a demanding business
Workload IQ: A Differentiated Approach
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
IDC Says, Don't Move To The Cloud

Archiving and e-Discovery for Novell GroupWise

  • 1. CL109 Archiving and e-Discovery for Novell GroupWise Jim F. Lundberg Vice President, Legal Novell, Inc. Travis Grandpre Product Marketing Manager Novell, Inc.
  • 2. Why are Archiving and e-Discovery Issues Becoming More Significant? • Legislation and Other Rules – HIPAA – SOX – GLB – FRCP • Recessionary Times – Cost cutting across all Corporate Budgets – Fortune 500 impact 2 © Novell, Inc. All rights reserved.
  • 3. Email Life Cycle – Creation • SOX – Demonstrate origination from a specific person • HIPAA – Protect against unauthorized access and include necessary disclaimers • Outside messages require inbound verification and protection to avoid inappropriate content or security risks 3 © Novell, Inc. All rights reserved.
  • 4. Email Life Cycle – Distribution • HIPAA – Must prevent unintended distribution of health information • GLB - Must prevent unintended distribution of confidential personal financial information • SOX – Audit capabilities of distribution • Protecting against unauthorized distribution of trade secrets or confidential information 4 © Novell, Inc. All rights reserved.
  • 5. Email Life Cycle – Retention • HIPAA, GLB – Requires protection against unauthorized access • HIPAA, SOX, Litigation – Ability to search and retrieve. • Litigation & audit - Protect against deletion or loss during. 5 © Novell, Inc. All rights reserved.
  • 6. Email Policy Considerations • Identity verification • Information protection • Content filtering • Archiving and preservation • Proof of compliance • Authentication • Virus and spam protection 6 © Novell, Inc. All rights reserved.
  • 7. Electronic Discovery Obligations Evolving Standards in Litigation – New Cases Every Day (e.g. The Pension Committee of the Univ. of Montreal, et. al. v. Banc of Am. Securities, LLC, et.al.) – Duty to preserve arises “once a party reasonably anticipates litigation”. – “Failure to preserve evidence resulting in the loss or destruction of relevant information is surely negligent and may be grossly negligent or willful”. – “Gross Negligence” where there was “no evidence that the defendants did anything to stop routine destruction”. – “Gross Negligence” where loss of data due to unfamiliarity with retention policy. – Failure to collect or properly review can be grossly negligent or willful (includes former employees). 7 © Novell, Inc. All rights reserved.
  • 8. “Spoliation” • “Spoliation refers to the destruction or alteration of evidence.” • Courts have inherent power to impose sanctions for spoliation. • Sanctions include: – Fines or “cost shifting” – Evidence Preclusion – Adverse Inference - “presume lost data was favorable to opposition's case” – Dismissal or Default Judgment • Severity of Sanction is generally based on the Judge's determination of party's negligence and relevance of data. 8 © Novell, Inc. All rights reserved.
  • 9. Electronic Discovery Process • Identification • Preservation • Collection • Review • Forensic data analysis • Production *In 2008 - Fortune 500 companies estimated cost of litigation at $210 Billion (1/3 of after tax profit for that year) 9 © Novell, Inc. All rights reserved.
  • 10. Identification • What machines are connected to a network? • Ability to identify individual files contained in email system • Identifying requested information (ie.. file type, creator, custodians, access dates, keywords) 10 © Novell, Inc. All rights reserved.
  • 11. Preservation • Files and metadata • Tracking preservation requests - “Litigation holds” • “Holding in place” or “Copying to secure repository” 11 © Novell, Inc. All rights reserved.
  • 12. Collection • Automation vs. Custodian directed • If responsive – requires copying for processing. • Collection reports and logs • Preserve integrity of metadata 12 © Novell, Inc. All rights reserved.
  • 13. Review • Inclusion vs. Exclusion • Search capabilities – Identification – Recognition – Bates Numbering – Categorization – Privileges – Redaction – Work product – Native File Format viewers – Attorney-Client – Exporting to various formats – Confidentiality) – litigation support databases or other review products 13 © Novell, Inc. All rights reserved.
  • 14. Forensic Data Analysis • Metadata • Custodian access • Analysis of multiple repositories 14 © Novell, Inc. All rights reserved.
  • 15. Production • Electronic files vs. Hard Documents • Native format • Other format (ie. XML) 15 © Novell, Inc. All rights reserved.
  • 16. Q&A
  • 17. Partner Solutions 17 © Novell, Inc. All rights reserved.
  • 19. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.