Jeff Jinnett: Value of an IT Security Due Diligence Document/Risk Mitigation Plan

If a company were ever asked to describe its IT security program, the company likely would have to bring in numerous staffers from the IT department and refer to reams of documents to present a full picture of the company’s IT security approach.  The need to be able to describe the company’s IT security program…

0

Jeff Jinnett: Adopting an Enterprise-Wide EDRM Platform to Get Electronic Discovery Under Control (Part II)

Our previous posting provided an overview of the typical ediscovery lifecyle and identified the need for an enterprise-wide approach to ediscovery. This posting will explore the explore some of issues relating to the ediscovery process steps in more detail and describe the characteristics of an enterprise-wide EDRM system for ediscovery. Some Issues Relating to Ediscovery…

0

Jeff Jinnett: Adopting an Enterprise-Wide EDRM Platform to Get Electronic Discovery Under Control (Part I)

One of the challenges facing many companies today is how to handle the production of electronic documents in the course of litigation discovery. For companies embroiled in litigation, electronic document records management can be an increasingly daunting and expensive task[1] . It is black letter law that computerized data is discoverable in litigation if relevant…

0