Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays

Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they have data sets so large and complex that they are difficult to process using on-hand database management tools and other tools – but because they have Big Data, they also have the desire to mine it, use it and gain insights related to the business, from it..

The mythology component comes into play when Big Data is hailed as a wondrous treasure trove of information that, once mined (that is, in the right way), will lead companies to great riches and success because suddenly new products will become known and more efficient processes will show themselves. That’s not to say there isn’t much to gain from mining Big Data. It can contain useful information that does help companies create success.

However, capitalizing on the information contained in Big Data requires tools, skill, patience and a little luck. That’s also true for a specific subset of Big Data: the legal compliance area of information management known as eDiscovery, which presents its own special difficulties. If traditional Big Data issues pose challenges to process for business insights, legal Big Data (eDiscovery, et al.) is even more challenging in that it requires data handling standards more strict than normal data migration or IT-related Big Data processing.

The Big Data associated with eDiscovery deals with potential and actual designated evidence. That means there must be a record of its creation, transfer, use and storage – a virtual chain of custody. As well, maintaining data integrity is paramount to ensuring its usefulness, whether in court or as a part of another legal scenario, such as a hearing, arbitration or regulatory examination.

To complicate matters even further, legal Big Data tends to come from unstructured locations such as emails filed by a user manually in a folder in Outlook or a presentation stored on a USB key. This makes it more difficult to identify, gather and use. For these reasons, eDiscovery has its own Big Data challenges, ones that are not necessarily easily solved using some of the newest Big Data mining and analysis techniques that are coming to market with great fanfare.

The good news is that Big Data is nothing new to eDiscovery professionals. These professionals rarely have the luxury of using typical and mature data mining and analysis techniques such as refined BI tools. Those of us working within the legal data compliance and legal information management industries know all too well the kludges, hacks, jimmying and other band-aided and duct-taped methods for identifying, gathering, processing, analyzing and otherwise handling data in a fast and furious manner, all to avoid the scenario in which lawyers are waiting for technical professionals to produce documents.

Through necessity, we have become very good at ensuring the rapid delivery of the few critical emails and presentations needed for the case among the millions that are not relevant, and we’re capable of doing it all in a way that withstands the computer forensic scrutiny of the domain, having developed specific new tools to mine Big Data for legal matters. So when it comes to combing through large data sets for legal assets and evidence, it pays to turn to the professionals who know how to get it done right – eDiscovery experts.

By Alon Israely,

Alon Israely, an attorney and Certified Information Systems Security Professional, is Manager of Strategic Partnerships at BIA. Introduced in 2011 and built on technology utilized since 2002, BIAs TotalDiscovery is the first on-demand, cloud-based integrated Legal Hold, Data Collection and ECA Solution available. With no software to install or hardware to provision, TotalDiscovery can be utilized immediately, with no extensive training or configuration required. TotalDiscovery was designed for cases of all sizes, from a few custodians to thousands. With its unique, flexible and predictable pricing model, no up-front costs and instant availability, it was designed with small and medium size cases in mind, while its advanced features, like Enterprise Connectivity, cater to the needs of larger enterprises. Find out more at www.totaldiscovery.com.

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

What’s On The Horizon For Cloud Computing

What’s On The Horizon For Cloud Computing

Cloud Computing Trends Now that we are a little more than halfway through 2016, many experts are beginning to make their predictions about cloud computing for the rest of the year and beyond. While many of the trends aren’t too unexpected (the ever increasing acceptance of cloud solutions by businesses, for instance) other trends are…

Tesla Solar Plan Would Cost Billions To Implement

Tesla Solar Plan Would Cost Billions To Implement

A 1,500-word manifesto that Elon Musk unveiled last week, outlining his plan to expand Tesla Motors Inc.’s electric-vehicle line and to build “stunning solar roofs,” may end up costing the company tens of billions of dollars to carry out. Musk, Tesla’s chairman and chief executive officer, gave the estimate on Tuesday after a tour of the…

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security It’s obvious that IoT can make the entire healthcare industry more efficient. The kind of data involved can be used to save time, physical energy and operating costs. Because of this, devices that facilitate medical data are becoming more commonplace in the industry. This includes things such as wearables that can track…

Zoho Announces Industry’s First Multichannel CRM Service

Zoho Announces Industry’s First Multichannel CRM Service

Zoho News According to Gartner, the Customer Relationship Management (CRM) software market grew by 12.3% from $23.4 billion in 2014 to $26.3 billion in 2015. Suggests Julian Poulter, research director at Gartner, “The merger and acquisition activity that began flowing through the market in 2009 continued in 2015, with more than 30 notable acquisitions. This…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…