Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays

Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they have data sets so large and complex that they are difficult to process using on-hand database management tools and other tools – but because they have Big Data, they also have the desire to mine it, use it and gain insights related to the business, from it..

The mythology component comes into play when Big Data is hailed as a wondrous treasure trove of information that, once mined (that is, in the right way), will lead companies to great riches and success because suddenly new products will become known and more efficient processes will show themselves. That’s not to say there isn’t much to gain from mining Big Data. It can contain useful information that does help companies create success.

However, capitalizing on the information contained in Big Data requires tools, skill, patience and a little luck. That’s also true for a specific subset of Big Data: the legal compliance area of information management known as eDiscovery, which presents its own special difficulties. If traditional Big Data issues pose challenges to process for business insights, legal Big Data (eDiscovery, et al.) is even more challenging in that it requires data handling standards more strict than normal data migration or IT-related Big Data processing.

The Big Data associated with eDiscovery deals with potential and actual designated evidence. That means there must be a record of its creation, transfer, use and storage – a virtual chain of custody. As well, maintaining data integrity is paramount to ensuring its usefulness, whether in court or as a part of another legal scenario, such as a hearing, arbitration or regulatory examination.

To complicate matters even further, legal Big Data tends to come from unstructured locations such as emails filed by a user manually in a folder in Outlook or a presentation stored on a USB key. This makes it more difficult to identify, gather and use. For these reasons, eDiscovery has its own Big Data challenges, ones that are not necessarily easily solved using some of the newest Big Data mining and analysis techniques that are coming to market with great fanfare.

The good news is that Big Data is nothing new to eDiscovery professionals. These professionals rarely have the luxury of using typical and mature data mining and analysis techniques such as refined BI tools. Those of us working within the legal data compliance and legal information management industries know all too well the kludges, hacks, jimmying and other band-aided and duct-taped methods for identifying, gathering, processing, analyzing and otherwise handling data in a fast and furious manner, all to avoid the scenario in which lawyers are waiting for technical professionals to produce documents.

Through necessity, we have become very good at ensuring the rapid delivery of the few critical emails and presentations needed for the case among the millions that are not relevant, and we’re capable of doing it all in a way that withstands the computer forensic scrutiny of the domain, having developed specific new tools to mine Big Data for legal matters. So when it comes to combing through large data sets for legal assets and evidence, it pays to turn to the professionals who know how to get it done right – eDiscovery experts.

By Alon Israely,

Alon Israely, an attorney and Certified Information Systems Security Professional, is Manager of Strategic Partnerships at BIA. Introduced in 2011 and built on technology utilized since 2002, BIAs TotalDiscovery is the first on-demand, cloud-based integrated Legal Hold, Data Collection and ECA Solution available. With no software to install or hardware to provision, TotalDiscovery can be utilized immediately, with no extensive training or configuration required. TotalDiscovery was designed for cases of all sizes, from a few custodians to thousands. With its unique, flexible and predictable pricing model, no up-front costs and instant availability, it was designed with small and medium size cases in mind, while its advanced features, like Enterprise Connectivity, cater to the needs of larger enterprises. Find out more at www.totaldiscovery.com.

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…