E-discovery moves in-house
More companies are seeing the wisdom of putting the function under internal IT control
Computerworld - When Jonathan Chow, chief information security officer at NBC Universal, found his department's services in increasing demand, that wasn't necessarily a good thing.
He says demand for e-discovery services was increasing 30% to 50% annually in the early and middle parts of the past decade, and he was seeing a dramatic rise in the hours spent supporting e-discovery as his department collected and culled through some of the electronically stored data needed by the company's legal staff.
The information security department, part of corporate IT, owns the e-discovery function and uses it not just for litigation support, Chow explains, but also for M&A activities and internal investigations generated by HR or corporate security, for example.
"We used to handle those occasional queries on an ad hoc basis, but as the number of e-discovery requests grew, this became a much larger and much more time-/resource-intensive process to manage," he said via e-mail. "It was obvious that we could more affordably conduct our e-discovery in-house, assuming we could find the best solutions to support our process."
So Chow moved e-discovery in-house in 2007.
Others are following a similar course. Analyst firm Enterprise Strategy Group (ESG) and Clearwell Systems Inc., an e-discovery software company in Mountain View, Calif., surveyed about 100 Fortune 2,000 enterprises and government agencies late last year and found that some 73% plan to bring e-discovery in-house.
Discovery is the part of the pretrial process in which both sides request information, data and documents from each other as each tries to find, or discover, facts pertinent to the case. Electronic discovery is the part of this longstanding legal process that refers to any information stored electronically.
High costs, increasing reliance on e-discovery
Several factors are driving this trend of bringing the e-discovery function in-house, including an anticipated rise in lawsuits, investigations and inquiries, as well as the high costs of outsourcing the task. Whatever the drivers, the shift means that IT departments are now implementing and maintaining the systems, and in some cases administering the searches themselves.
"A decade ago, e-discovery was more the exception rather than the norm, so companies did not have to go through it regularly. They weren't familiar with it, they didn't have the staffing, nor did they want the staffing to support it, because it wasn't something that happened frequently," explains Brian Babineau, a senior consulting analyst at ESG.
"Now it's become mainstream. Now every litigation or regulatory action is asking for some electronically stored information, and because of that frequency and because it's becoming more of a standard business process, it now makes sense to evaluate whether you should staff it and build some competencies internally," he says.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts