Information Management – The Big Picture

Given the explosive growth of electronic information in corporate America, managing electronic discovery is increasingly challenging for corporate IT departments and in-house and outside counsel, each of whom are stakeholders. In December of 2006, the Judicial Conference of the US amended the Federal Rules of Civil Procedure (FRCP) to clarify the roles, responsibilities, and discovery obligations of the various parties to litigation. For the first time, the amendments made specific reference to electronically stored information, or ESI, as it is now commonly known. The changes in attitudes toward e-discovery are noticeable, and the amendments have, without question, helped create an unprecedented level of dialog and collaboration to understand how electronic information is generated, used, managed, and disposed of in the corporate environment.
Why, then, have the amendments intended to reduce confusion, also introduced a level of complexity to the e-discovery process that has left a lot of people scratching their heads?
For example, corporate counsel in a defense posture is keyed in everything from creating corporate data maps to handling multiple and complex litigation holds, as well as establishing repeatable and defensible guidelines for discovery. What happens the following week when the storage administrator retires a key server and implements his data consolidation strategy? How good is the data map then?
Records retention managers have also been significantly affected. For years, they have been seen as silent corporate operatives who had murky roles and dealt with boxes of old documents. Today, nothing could be further from the truth. They are on the front lines of protecting an organization from a data management policy perspective.
Another role that has seen significant evolution is that of the “storage administrator.” Corporate data storage administrators are IT personnel whose roles are largely characterized by their knowledge of an organization’s data growth and proliferation patterns – key factors that allow them to make recommendations as to how, when and if an organization’s data management hardware and associated software platforms need modification or change.
Another driver is the evolution of technology for e-discovery to serve both proactive and reactive use cases. The vast majority of today’s matters are addressed in a reactive fashion with a mind to quickly address pressing, active concerns that demand rapid retrieval of responsive ESI for early case assessments meet and confer, and other matter-specific requirements. However, the future is bright in that there is a need for consistent, repeatable, and targeted e-discovery processes that can also be deployed across a company, creating an “e-discovery ready,” proactive environment.
Therefore, the answer may lie in the fact that while the amendments impose obligations on the parties, they don’t explicitly state how to fulfill them. When it comes to corporations today, the old silo-based information management paradigms will not work when it comes to information discovery of any kind, for any reason. The bottom line is: litigation, storage management/data consolidation, records retention, regulatory responses, internal investigations, information security initiatives, personnel policy management, business intelligence, data mining, compliance, and monitoring are all effectively subsets of what we call “e-discovery.” This new paradigm of e-discovery subsumes many previously compartmentalized departmental initiatives under the auspices of legal, IT, records management, HR, and finance. It is predicated on the degree to which an organization has information access and the ability to perform useful data classification. Companies should be able to leverage enterprise data for multiple business needs from common underlying information access and classification platform.

David Morris – Morris Bytes

Published by morrisjd1

David Morris is a technology and business executive with 20+ years of management & high-growth experience in both startup & public companies. His experience spans technology development & innovation, business strategy & management, corporate & business development, engineering, & marketing roles. Recognized for his ability to identify new emerging markets, develop targeted solutions, and create accretive strategic imperatives, David has worked with and advised private equity backed and public companies to position them into high-growth markets, including Kazeon, acquired by EMC, and Cetas, acquired by VMware. With a reputation as a technology thought leader and evangelist through blogs, articles, and speaking engagements, he had advised numerous companies on emerging technology market trends and the impact of disruptive technologies on existing busines models. David has founded two companies, launched six (6) companies, had two (2) successful public successful turnarounds. His technology experience is across compute, networking, storage, compliance, eDiscovery, SaaS, IoT, cybersecurity, Linux containers for DevOps & Storage, & AI solutions. David holds graduate degrees in Marketing from the University of California, Berkeley-Haas, in Finance from Columbia University in the City of New York, and in Engineering from George Washington University, as well as a Bachelors in Physics from Auburn University. He currently advises Aerwave, a next-gen security company, Loop, and Brite Discovery, a GDPR compliance and eDiscovery company. He is active in and is a long time supporter of Compass Family Services, which services homeless and at-risk families in San Francisco, The Tech Interactive in San Jose, CA, and The American Indian Science and Engineering Society. In his off time, David enjoys cycling, weightlifting, and scuba diving (especially in Belize). LinkedIn: https://www.linkedin.com/in/jdavidmorris

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: