Ready to produce IMs in court?
Guidelines expand types of electronic info you'll need for discovery
IDG News Service - Companies that do not keep close tabs on PDAs, instant message conversations and other forms of electronic data may soon be in for a nasty surprise, should they find themselves in court. As of Dec, 1, 2006, new guidelines, called the Federal Rules of Civil Procedure, go into effect. The rules, set by the U.S. Supreme Court, expand the types of electronically stored information that companies could be required to produce in a lawsuit.
That means companies will now be on the hook to retain and produce a broader range of digital data than before. Flash drives, voice-mail systems and instant message archives will all be added to the mix.
According to a recent online survey, executives are ill-prepared for the new rules: In a November study by Deloitte Financial Advisory Services, almost 70% of respondents said they require more training on their own corporate record retention policies and procedures (and this in an audience including many CFOs, tax directors, finance directors, attorneys and controllers). Deloitte says the time is ripe to examine your data retention strategy.
One way that enterprise IT can prevent surprises under the new rules is by more thorough auditing. Take instant messaging: According to a 2006 study by the American Management Association and the ePolicy Institute, more than half of those who use free IM software at work say that their employers have no idea what they're up to.
For most companies, the biggest worries stemming from the use of undisciplined instant messaging will be skyrocketing costs and lost productivity during discovery, says Jeffrey Ritter, cofounder of Waters Edge Consulting, an information management consultancy based in Reston, Va. "The burden facing companies is cost containment," he says.
Companies can get into real trouble when the CIO, general counsel and records manager are not on the same page, Ritter adds. "The most significant challenge for many companies is the lack of a teamed approach to evaluating the risk."
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!