Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays

Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they have data sets so large and complex that they are difficult to process using on-hand database management tools and other tools – but because they have Big Data, they also have the desire to mine it, use it and gain insights related to the business, from it..

The mythology component comes into play when Big Data is hailed as a wondrous treasure trove of information that, once mined (that is, in the right way), will lead companies to great riches and success because suddenly new products will become known and more efficient processes will show themselves. That’s not to say there isn’t much to gain from mining Big Data. It can contain useful information that does help companies create success.

However, capitalizing on the information contained in Big Data requires tools, skill, patience and a little luck. That’s also true for a specific subset of Big Data: the legal compliance area of information management known as eDiscovery, which presents its own special difficulties. If traditional Big Data issues pose challenges to process for business insights, legal Big Data (eDiscovery, et al.) is even more challenging in that it requires data handling standards more strict than normal data migration or IT-related Big Data processing.

The Big Data associated with eDiscovery deals with potential and actual designated evidence. That means there must be a record of its creation, transfer, use and storage – a virtual chain of custody. As well, maintaining data integrity is paramount to ensuring its usefulness, whether in court or as a part of another legal scenario, such as a hearing, arbitration or regulatory examination.

To complicate matters even further, legal Big Data tends to come from unstructured locations such as emails filed by a user manually in a folder in Outlook or a presentation stored on a USB key. This makes it more difficult to identify, gather and use. For these reasons, eDiscovery has its own Big Data challenges, ones that are not necessarily easily solved using some of the newest Big Data mining and analysis techniques that are coming to market with great fanfare.

The good news is that Big Data is nothing new to eDiscovery professionals. These professionals rarely have the luxury of using typical and mature data mining and analysis techniques such as refined BI tools. Those of us working within the legal data compliance and legal information management industries know all too well the kludges, hacks, jimmying and other band-aided and duct-taped methods for identifying, gathering, processing, analyzing and otherwise handling data in a fast and furious manner, all to avoid the scenario in which lawyers are waiting for technical professionals to produce documents.

Through necessity, we have become very good at ensuring the rapid delivery of the few critical emails and presentations needed for the case among the millions that are not relevant, and we’re capable of doing it all in a way that withstands the computer forensic scrutiny of the domain, having developed specific new tools to mine Big Data for legal matters. So when it comes to combing through large data sets for legal assets and evidence, it pays to turn to the professionals who know how to get it done right – eDiscovery experts.

By Alon Israely,

Alon Israely, an attorney and Certified Information Systems Security Professional, is Manager of Strategic Partnerships at BIA. Introduced in 2011 and built on technology utilized since 2002, BIAs TotalDiscovery is the first on-demand, cloud-based integrated Legal Hold, Data Collection and ECA Solution available. With no software to install or hardware to provision, TotalDiscovery can be utilized immediately, with no extensive training or configuration required. TotalDiscovery was designed for cases of all sizes, from a few custodians to thousands. With its unique, flexible and predictable pricing model, no up-front costs and instant availability, it was designed with small and medium size cases in mind, while its advanced features, like Enterprise Connectivity, cater to the needs of larger enterprises. Find out more at www.totaldiscovery.com.

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand, but in an ever-changing technology landscape and with complex, inter-related business operations to manage, implementing GRC can seem like a…

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud computing, and analytics. If you pay attention, however, you will notice that truly mature and successful digital businesses do not jump at every new technological tool or platform. While they do not sit and wait for months or years to create social media pages or to take advantage of new analytical services, they do approach…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the adoption of new technologies such as the cloud. Keeping data on-premise has long-been considered to be the more secure option;…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but the early days of a transformational shift in the way Enterprises (large and small) purchase technology services. Enterprises are capitalizing…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There are many other compelling reasons to make the move, perhaps most importantly agility and scalability. A better question might be…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how safely the cars are driving, not how safe they are from cyber-attack – the McAfee Threat Predictions 2016 Report warned…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards. It’s getting worse: McKinsey in conjunction with the World Economic Forum have estimated that failing cyber security approaches could have…