Summary
It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.
In this Practice Guide
- The relative merits of common security compliance frameworks
- The pros and cons of cloud and on-premises storage environments
- The essential need for data encryption at rest and in transit
Key Insights
- The need for everyone to contribute to data protection
- The critical importance of role-based access control
- The need to adapt to evolving threat tactics
Practice Guide Download
About the Authors
From the author
Why Now Is the Time for Legal Teams to Invest in Self-Service eDiscovery
This white paper reviews what you need to know about self-service eDiscovery, including the problems it’s designed to solve and the benefits it brings to the practice of law.
An Embarrassment of Riches: Analytic Tools and Techniques
The tide of data never stops rising, and the sources of data never stop multiplying, and legal practitioners must somehow find a way to analyze it. Finding a way that is efficient and effective requires understanding the tools and techniques available to you so you can leverage the right ones.