Summary
It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.
In this Practice Guide
- The relative merits of common security compliance frameworks
- The pros and cons of cloud and on-premises storage environments
- The essential need for data encryption at rest and in transit
Key Insights
- The need for everyone to contribute to data protection
- The critical importance of role-based access control
- The need to adapt to evolving threat tactics
Practice Guide Download
About the Authors
From the author
ED106 – The Main Event: Review Fundamentals
Document review is typically the most expensive phase of a discovery project, even with the sophisticated tools and techniques available today. Past studies have attributed more than half of discovery costs to review.
How to Manage the Unexpected Resignation of a Key Legal Employee
In every legal team, resignations are inevitable – regardless of how valued your employees may feel. There is a lot to consider when a key employee resigns, and your first instinct may be to focus only on immediate workload, but it’s also important to make a long-term planning a priority.