SlideShare a Scribd company logo
Digital law and governance 
e-discovery 
Jacques 
Folon 
www.folon.com 
Partner 
Edge 
Consulting 
Maître 
de 
conférences 
Université 
de 
Liège 
Chargé 
de 
cours 
ICHEC 
Brussels 
Management 
School 
Professeur 
invité 
Université 
de 
Lorraine 
(Metz) 
ESC 
Rennes 
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
4
1.where are we now ? 
2.Need of an electronic content 
management 
3.E-discovery 
4.Sedona Principles 
3
1. Where are we now? 
5
Information overload 
6
Control ?
Which information ? 
• Electronically stored information (ESI) 
• Scannes documents 
• Fax 
• Texts, excel sheets, powerpoint (word, pages, 
including old versions of the software versions) 
• Emails in & out 
• Databases, websites, blogs,… 
• Hard disks (central, local, pc, external, USB 
sticks, …) 
• CRM, CMS 
• GSM et PDA 
• Time sheet 
• Acounting 
• Intant messaging 
• Voice mail 
• GPS navigation systems 
• Metadata 
• social networks (internbal & external) 
• … 8
9 
Increase of data from 2010 ->2014 = + 650% (Gartner) 
85% of the data are not structured 
80% of data search gave no result
2. Prerequisite: 
Electronic data management 
10
www.aiim.org/training
Source : https://www.britestream.com/difference.html.
The importance of records 
• Most of today’s 
records start out 
in electronic form 
– Letters 
– Emails 
– Faxes 
– Web transactions 
– Other transactions 
Source: What is ERM www.aiim.org/training 
Copyright © AIIM | All rights reserved
Electronic records management 
Question: Is ERM 
• The electronic management of paper 
records? 
• The management of electronic records? 
Answer: Both 
Source: What is ERM www.aiim.org/training
Content types and how well managed 
For each type of content, evaluate the degree of control that exists in your 
organization in managing it. 
All respondents (462) 
Source: What is ERM www.aiim.org/training
What are the main business drivers? 
Effectiveness 
ERM 
Efficiency 
Continuity 
Compliance 
Copyright © AIIM | All Srigohtus rrecseerv:e dWhat is ERM www.aiim.org/training
Driver: Compliance 
• Laws 
• Regulations 
• Policies 
• Standards 
• Good practice 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Effectiveness 
• Not losing records 
• Sharing records 
• Finding records easily 
• Getting the complete picture 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Efficiency 
• Accessing records quickly 
• Space savings 
• Reduced handling costs 
• Other examples 
– Archival costs 
– Disposal of furniture 
– Consumables 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Driver: Continuity 
• Records are vulnerable to loss 
• Businesses tend to fail if they 
lose their records 
• Electronic storage may 
speed recovery from 
a disaster 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
The records lifecycle 
Source: NARA 
Copyright © AIIM | All rights reserved 
Source: What is ERM www.aiim.org/training
Fundamental principles 
• Records are created, received, 
and used in the conduct of 
organisational activities 
• Organisations should create 
and maintain authentic, 
reliable, and usable records 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Access and usage principles 
• Records should be accessible to authorised 
users 
• Users should be able to 
search and access records 
in usable formats 
• Records should be organised 
to support access and 
management 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Retention principles 
• Records must be managed through their 
lifecycle 
• Records should be kept as long as required 
– Statutory requirements 
– Legal requirements 
– Business or operational needs 
• Retaining records longer than required may 
increase organisational liability 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Disposition principles 
• Disposition is an accepted phase of the 
records lifecycle 
– Transfer/accession 
– Destruction 
• Records should be 
disposed of at the 
end of the lifecycle 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
What is ‘Capture’ 
ERM System 
Capture 
Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
The purpose of capturing records 
▪Establish a relationship between the record 
and its context 
▪Place the record into a controlled 
environment 
▪Link the record to other related records 
▪Allow the record to be managed effectively 
Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
Why not capture everything? 
• Hard cost of storage 
• Volume of non-records to sift through 
– Operationally 
– For legal or audit requirements 
• Increased liability for 
disclosing too much 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
So, what is metadata? 
• Metadata = “Data about data” 
– For a document or record this means data such 
as its author, its title, the issue date, and other 
information which can usefully be associated 
with it 
• Nothing new or unique 
• Defined in terms of units called “Elements” 
or “Fields.” 
– Some support “sub-elements” or “attributes” 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Perspectives on metadata 
• Entering metadata is often called “indexing” 
• Different users of an ERM system will have 
different views of what metadata can do for 
them, and what metadata is required 
– Business perspective 
– Records management perspective 
– User perspective 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Why is access control necessary? 
• Ensure ‘systematic control’ and ‘credible 
evidence’ 
• Ensure authoritative records 
• Protect commercially sensitive information 
• Protect personal 
information 
• Limit access to protectively 
marked information 
Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
The objects of user access rights 
• Provide or limit access to specific 
classes, 
files or records 
• Provide or limit access to features 
• Provide or limit access by security 
classification 
– ‘Need to know’ 
Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
Retention periods - 1 
• Capturing a record implies need for 
retention 
• A record may be retained in different ways 
– ERM system 
– Software application 
– Separate electronic media 
– Paper 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
Retention periods - 2 
• Records will vary in their intrinsic nature 
• Some records may need to be retained for 
very long periods of time 
• Other records will need to be 
retained for shorter periods 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
The benefits of destroying records 
• Keeping everything forever is expensive 
– Storage costs 
– Search and retrieval 
– Discovery 
• Courts have held that there is no 
requirement to keep everything forever 
• Destroying records reduces risk 
– When it is done consistently and in accordance 
with the records program 
Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
3. After ERM => ediscovery 
36
Definition & context 
• E-dicovery is a process to search, localise, 
secure, identify a data in order to have it 
as an evidence before the court 
• Necessity to have a quick result 
• the right data at the right time 
• translation sometimes necessary 
Source www.systran.fr 37
Ediscovery model 
38 
Source for the next 9 slides: http://edrm.net
1/information mgt 
39
2/ identification 
40
3/ preservation 
41
4/ collection 
Collection is the acquisition of potentially relevant electronically stored information 
(ESI) as defined in the identification phase of the electronic discovery process. The 
exigencies of litigation, governmental inquiries, and internal investigations generally 
require that ESI and its associated metadata should be collected in a manner that is 
legally defensible, proportionate, efficient, auditable, and targeted. 
42
5/ processing 
43
6/ review 
44
7/ Analyse 
45
8/ Production 
46
9/ Presentation 
47
GSA IT Quarterly Forum -- 
Aug 2007 
48 
4/ The Sedona Principles: 
Best Practices Recommendations & Principles for Addressing Electronic Document 
Production 
(Second edition, June 2007) 
The Sedona Guidelines: 
Best Practices Guidelines & Commentary for Managing Information and Records in the 
Electronic Age 
(Sept. 2005)
49 
The Sedona Guidelines 
– Second work product of working group 
– Draft published in September 2004 for public comment; published 
in September 2005. 
– They are: 
• Important background and roadmap of issues 
• Link between RIM, IT and Legal Perspectives 
• Flexible, Scalable and Reasonable 
– They are not: 
• Standards or minimum requirements 
• Unchangeable
50 
The Sedona Guidelines 
• 1. An organization should have reasonable policies and 
procedures for managing its information and records.
The Sedona Guidelines 
• 2. An organization’s information and records management 
policies and procedures should be realistic, practical and 
tailored to the circumstances of the organization. 
51
52 
The Sedona Guidelines 
• 3. An organization need not retain all electronic 
information ever generated or received.
The Sedona Guidelines 
• 4. An organization adopting an information and records 
management policy should consider including procedures 
that address the creation, identification, retention, retrieval 
and ultimate disposition or destruction of information and 
records. 
53
The Sedona Guidelines 
• 5. An organization’s policies and procedures must mandate 
the suspension of ordinary destruction practices and 
procedures as necessary to comply with preservation 
obligations related to actual or reasonably anticipated 
litigation, governmental investigation or audit. 
54
5. Conclusion 
55
Information security manager
Digital documents & e-discovery
Are we ready to be there? 
59
Jacques Folon 
Jacques.folon@ichec.be
Any questions ?

More Related Content

PDF
Identity and Access Management 101
PDF
IDENTITY ACCESS MANAGEMENT
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Compliance & Identity access management
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPT
Building an Effective Identity Management Strategy
Identity and Access Management 101
IDENTITY ACCESS MANAGEMENT
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Compliance & Identity access management
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Building an Effective Identity Management Strategy

What's hot (20)

PDF
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
PPT
Identity Access Management (IAM)
PDF
Identity & Access Management by K. K. Mookhey
PDF
Mt26 identity management as a service
PPTX
Intel IT's Identity and Access Management Journey
PPTX
Identity and Access Management Introduction
PDF
Online terms & conditions
PPTX
Identity & access management
PPTX
What to Expect in 2016: Top 5 Predictions for Security and Access Control
PPTX
2013 12 18 webcast - building the privileged identity management business case
PPTX
5 reasons your iam solution will fail
PPTX
Smart Identity for the Hybrid Multicloud World
PDF
IBM - IAM Security and Trends
PDF
Cloud computing identity management summary
PPTX
Identity and Access Management - RSA 2017 Security Foundations Seminar
PPTX
Identity Governance Solutions
PPTX
Con 8810 who should have access to what - final
PPTX
Tuebora Self Driven IAM
PDF
Identity & Access Management for Securing DevOps
PDF
Hitachi ID Identity and Access Management Suite
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Identity Access Management (IAM)
Identity & Access Management by K. K. Mookhey
Mt26 identity management as a service
Intel IT's Identity and Access Management Journey
Identity and Access Management Introduction
Online terms & conditions
Identity & access management
What to Expect in 2016: Top 5 Predictions for Security and Access Control
2013 12 18 webcast - building the privileged identity management business case
5 reasons your iam solution will fail
Smart Identity for the Hybrid Multicloud World
IBM - IAM Security and Trends
Cloud computing identity management summary
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity Governance Solutions
Con 8810 who should have access to what - final
Tuebora Self Driven IAM
Identity & Access Management for Securing DevOps
Hitachi ID Identity and Access Management Suite
Ad

Similar to Digital documents & e-discovery (20)

PPT
Ediscovery Fedisa Belgium
PPTX
What is Electronic Records Management?
DOCX
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
PPTX
Managing Electronic Records Within A Federal Government Workplace
PPTX
Managing Electronic Records Within A Federal Government Workplace
PPTX
Electronic files are records too
PPTX
eDiscovery and Records Oh...My!
PPTX
Records_Manager_-_CE_2013.7.1_-_slides
PPTX
AMCTO presentation on moving from records managment to information management
PPTX
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
DOCX
Records Management
PPT
rm, 10e ch02 copy
PPT
Effective Information Management V2 18sep2008
PDF
Jahima Edrm Imrm
PDF
Records and Information Management 2nd Edition Patricia C. Franks
PDF
Records-Management_Getting_Started_WP[9]
PPT
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
PPTX
Igs animation s;lide
PDF
Corporate Information Management: Core Concepts & Best Practices
Ediscovery Fedisa Belgium
What is Electronic Records Management?
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
Managing Electronic Records Within A Federal Government Workplace
Managing Electronic Records Within A Federal Government Workplace
Electronic files are records too
eDiscovery and Records Oh...My!
Records_Manager_-_CE_2013.7.1_-_slides
AMCTO presentation on moving from records managment to information management
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
Records Management
rm, 10e ch02 copy
Effective Information Management V2 18sep2008
Jahima Edrm Imrm
Records and Information Management 2nd Edition Patricia C. Franks
Records-Management_Getting_Started_WP[9]
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Igs animation s;lide
Corporate Information Management: Core Concepts & Best Practices
Ad

More from Prof. Jacques Folon (Ph.D) (20)

PPTX
Introduction to digital strategy
PPTX
PPTX
Cpas divers sujets
PPTX
Ferrer premier cours octobre 2021
PPTX
premier cours saint louis sept 2021
PPTX
Cmd premier cours sept 2021
PPTX
CPAS ET RGPD : direction et DPO
PPTX
le RGPD fossoyeur du marketing digital ?
PPTX
Ifc gdpr strat digit mai 2021
PPTX
Pandemie et vie privee
PPTX
GDPR & digital strategy
PPTX
Cmd de la stratégie au marketing digital
PPTX
Ichec ipr feb 2021
PPTX
Strategy for digital business class #1
PPTX
PPTX
Cmd premier cours
PPTX
PPTX
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
PPTX
RGPD et stratégie digitale
Introduction to digital strategy
Cpas divers sujets
Ferrer premier cours octobre 2021
premier cours saint louis sept 2021
Cmd premier cours sept 2021
CPAS ET RGPD : direction et DPO
le RGPD fossoyeur du marketing digital ?
Ifc gdpr strat digit mai 2021
Pandemie et vie privee
GDPR & digital strategy
Cmd de la stratégie au marketing digital
Ichec ipr feb 2021
Strategy for digital business class #1
Cmd premier cours
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
RGPD et stratégie digitale

Recently uploaded (20)

PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Classroom Observation Tools for Teachers
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPH.pptx obstetrics and gynecology in nursing
TR - Agricultural Crops Production NC III.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose
GDM (1) (1).pptx small presentation for students
O5-L3 Freight Transport Ops (International) V1.pdf
Insiders guide to clinical Medicine.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx

Digital documents & e-discovery

  • 1. Digital law and governance e-discovery Jacques Folon www.folon.com Partner Edge Consulting Maître de conférences Université de Liège Chargé de cours ICHEC Brussels Management School Professeur invité Université de Lorraine (Metz) ESC Rennes http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
  • 2. 4
  • 3. 1.where are we now ? 2.Need of an electronic content management 3.E-discovery 4.Sedona Principles 3
  • 4. 1. Where are we now? 5
  • 7. Which information ? • Electronically stored information (ESI) • Scannes documents • Fax • Texts, excel sheets, powerpoint (word, pages, including old versions of the software versions) • Emails in & out • Databases, websites, blogs,… • Hard disks (central, local, pc, external, USB sticks, …) • CRM, CMS • GSM et PDA • Time sheet • Acounting • Intant messaging • Voice mail • GPS navigation systems • Metadata • social networks (internbal & external) • … 8
  • 8. 9 Increase of data from 2010 ->2014 = + 650% (Gartner) 85% of the data are not structured 80% of data search gave no result
  • 9. 2. Prerequisite: Electronic data management 10
  • 12. The importance of records • Most of today’s records start out in electronic form – Letters – Emails – Faxes – Web transactions – Other transactions Source: What is ERM www.aiim.org/training Copyright © AIIM | All rights reserved
  • 13. Electronic records management Question: Is ERM • The electronic management of paper records? • The management of electronic records? Answer: Both Source: What is ERM www.aiim.org/training
  • 14. Content types and how well managed For each type of content, evaluate the degree of control that exists in your organization in managing it. All respondents (462) Source: What is ERM www.aiim.org/training
  • 15. What are the main business drivers? Effectiveness ERM Efficiency Continuity Compliance Copyright © AIIM | All Srigohtus rrecseerv:e dWhat is ERM www.aiim.org/training
  • 16. Driver: Compliance • Laws • Regulations • Policies • Standards • Good practice Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 17. Driver: Effectiveness • Not losing records • Sharing records • Finding records easily • Getting the complete picture Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 18. Driver: Efficiency • Accessing records quickly • Space savings • Reduced handling costs • Other examples – Archival costs – Disposal of furniture – Consumables Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 19. Driver: Continuity • Records are vulnerable to loss • Businesses tend to fail if they lose their records • Electronic storage may speed recovery from a disaster Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 20. The records lifecycle Source: NARA Copyright © AIIM | All rights reserved Source: What is ERM www.aiim.org/training
  • 21. Fundamental principles • Records are created, received, and used in the conduct of organisational activities • Organisations should create and maintain authentic, reliable, and usable records Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 22. Access and usage principles • Records should be accessible to authorised users • Users should be able to search and access records in usable formats • Records should be organised to support access and management Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 23. Retention principles • Records must be managed through their lifecycle • Records should be kept as long as required – Statutory requirements – Legal requirements – Business or operational needs • Retaining records longer than required may increase organisational liability Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 24. Disposition principles • Disposition is an accepted phase of the records lifecycle – Transfer/accession – Destruction • Records should be disposed of at the end of the lifecycle Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 25. What is ‘Capture’ ERM System Capture Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
  • 26. The purpose of capturing records ▪Establish a relationship between the record and its context ▪Place the record into a controlled environment ▪Link the record to other related records ▪Allow the record to be managed effectively Copyright © AIIM | ASll origuhtrsc rees:e rvWedhat is ERM www.aiim.org/training
  • 27. Why not capture everything? • Hard cost of storage • Volume of non-records to sift through – Operationally – For legal or audit requirements • Increased liability for disclosing too much Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 28. So, what is metadata? • Metadata = “Data about data” – For a document or record this means data such as its author, its title, the issue date, and other information which can usefully be associated with it • Nothing new or unique • Defined in terms of units called “Elements” or “Fields.” – Some support “sub-elements” or “attributes” Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 29. Perspectives on metadata • Entering metadata is often called “indexing” • Different users of an ERM system will have different views of what metadata can do for them, and what metadata is required – Business perspective – Records management perspective – User perspective Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 30. Why is access control necessary? • Ensure ‘systematic control’ and ‘credible evidence’ • Ensure authoritative records • Protect commercially sensitive information • Protect personal information • Limit access to protectively marked information Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
  • 31. The objects of user access rights • Provide or limit access to specific classes, files or records • Provide or limit access to features • Provide or limit access by security classification – ‘Need to know’ Copyright © AIIM | ASll origuhrtsc ree:s eWrvehdat is ERM www.aiim.org/training
  • 32. Retention periods - 1 • Capturing a record implies need for retention • A record may be retained in different ways – ERM system – Software application – Separate electronic media – Paper Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 33. Retention periods - 2 • Records will vary in their intrinsic nature • Some records may need to be retained for very long periods of time • Other records will need to be retained for shorter periods Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 34. The benefits of destroying records • Keeping everything forever is expensive – Storage costs – Search and retrieval – Discovery • Courts have held that there is no requirement to keep everything forever • Destroying records reduces risk – When it is done consistently and in accordance with the records program Copyright © AIIM | AllS rioghutsr crees:e rWvedhat is ERM www.aiim.org/training
  • 35. 3. After ERM => ediscovery 36
  • 36. Definition & context • E-dicovery is a process to search, localise, secure, identify a data in order to have it as an evidence before the court • Necessity to have a quick result • the right data at the right time • translation sometimes necessary Source www.systran.fr 37
  • 37. Ediscovery model 38 Source for the next 9 slides: http://edrm.net
  • 41. 4/ collection Collection is the acquisition of potentially relevant electronically stored information (ESI) as defined in the identification phase of the electronic discovery process. The exigencies of litigation, governmental inquiries, and internal investigations generally require that ESI and its associated metadata should be collected in a manner that is legally defensible, proportionate, efficient, auditable, and targeted. 42
  • 47. GSA IT Quarterly Forum -- Aug 2007 48 4/ The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production (Second edition, June 2007) The Sedona Guidelines: Best Practices Guidelines & Commentary for Managing Information and Records in the Electronic Age (Sept. 2005)
  • 48. 49 The Sedona Guidelines – Second work product of working group – Draft published in September 2004 for public comment; published in September 2005. – They are: • Important background and roadmap of issues • Link between RIM, IT and Legal Perspectives • Flexible, Scalable and Reasonable – They are not: • Standards or minimum requirements • Unchangeable
  • 49. 50 The Sedona Guidelines • 1. An organization should have reasonable policies and procedures for managing its information and records.
  • 50. The Sedona Guidelines • 2. An organization’s information and records management policies and procedures should be realistic, practical and tailored to the circumstances of the organization. 51
  • 51. 52 The Sedona Guidelines • 3. An organization need not retain all electronic information ever generated or received.
  • 52. The Sedona Guidelines • 4. An organization adopting an information and records management policy should consider including procedures that address the creation, identification, retention, retrieval and ultimate disposition or destruction of information and records. 53
  • 53. The Sedona Guidelines • 5. An organization’s policies and procedures must mandate the suspension of ordinary destruction practices and procedures as necessary to comply with preservation obligations related to actual or reasonably anticipated litigation, governmental investigation or audit. 54
  • 57. Are we ready to be there? 59