Information Technology Reference
In-Depth Information
possibly.any.agreed.upon.production.criteria.of.data.for.the.
opposing.party.
For. instance,. the. parties. may. have. agreed. to. produce.
e-mail.records.for.certain.date.ranges.and.regarding.certain.
subjects.or.keywords..They.may.also.have.agreed.that.those.
e-mail.records.could.be.produced.as.Tiff.iles.or.images.with.
or.without.copies.of.the.metadata.that.revealed.the.source,.
destination,.path,.and.date/time.stamps.of.the.e-mails..They.
might.have.required.that.they.be.produced.in.their.original.
format.which.is.quite.often.the.case.as.that.can.do.a.better.
job.of.preserving.metadata..In.this.instance,.the.legal.team,.
after. removing. nonrelevant. or. privileged. e-mails,. would.
preserve.the.rest.of.the.e-mail.data.in.the.fashion.that.was.
agreed.upon.
At.this.point.we.have.reached.that.small.section.of.the.pie.
that.is.producible,.relevant.electronic.evidence..As.you.might.
imagine,.this.process.can.be.extremely.time.consuming.and.
resource.intensive..But.the.degree.to.which.your.organization.
has.developed.and.managed.its.records.will.make.a.huge.dif-
ference.in.how.onerous.or.simple.this.process.is.for.you.
6.5 SAFE STORAGE ISSUES AND
CONSIDERATIONS
Keeping.your.data.physically.and.logically.safe.is.one.impor-
tant.component.of.establishing.and.ensuring.the.integrity.of.
the.data.
In.Section.6.3.where.we.discussed.authentication,.we.dis-
cussed. the. idea. of. securing. your. data. logically. by. virtue. of.
good.identity.management.systems,.encryption,.and.segrega-
tion.of.different.systems..Those.means.of.securing.the.access.
to.your.data.are.your.irst.line.of.defense.in.ensuring.the.safe.
storage.of.your.information.
A.second.consideration.is.the.actual.physical.storage.and.
your.disaster.recovery.and.business.continuity.planning..These.
should.include.backup.and.restore.procedures.as.well.as.emer-
gency.readiness.and.resilience.considerations.(FigureĀ 6.4).
Search WWH ::




Custom Search