Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec eDiscovery Blog
Showing posts in English
Aayush Jain | 02 Dec 2014 | 0 comments

eDiscovery admins are repeatedly being asked to do many things in a small amount of time. Even though technology has made their lives easier, the amount of data and the problems it comes with have consistently grown in the past decade, thereby increasing time spent on manual and repetitive tasks.

A smart eDiscovery tool should be able to adapt itself to a user’s workflow and increase efficiencies. One of the ways to squeeze more time out of the day is to let the software do the work by automating your workflow. This reduces the boredom and time spent doing repetitive tasks.

Why is it beneficial to automate?

  • Automating redundant tasks can help free up time to focus on more important issues. For example, an admin doesn’t have to wait for processing to finish to plan out the next step in the eDiscovery workflow. They can just schedule what needs to happen when a certain action finishes and their workflow is repeated automatically...
Mat Beer | 19 Nov 2014 | 0 comments

There is an ongoing debate in the industry around how to treat document families.  But, what is a document family?  Well, there are several kinds of families whether this is an e-mail and its attachments or a zip file with the contained content.

But the usual debate is around e-mail families.  The e-mail is the parent and each attachment is a child, hence the term family!

Why is there a debate about this?  An email is just an email right?  Well, anyone trying to control costs and reduce risk within an eDiscovery exercise very much cares about this topic.

Consider an e-mail with 10 attachments.  I have some targeted keyword searches and I identify a hit in only one of the attachments to the email.  Does my reviewer need to review the email and 10 attachments or just the one attachment that has the hit?  The approach taken will have a large impact on the overall review costs and the approach taken will very much depend on...

Ash_Gupta | 11 Nov 2014 | 0 comments

When I talk to customers, one of their common challenges is to get custodians to acknowledge their Legal Hold notifications. This is even more important considering courts are increasingly imposing sanctions for inadequate Legal Hold notification and evidence spoliation (e.g., DuPont v. Kolon).

Why does this happen? Are custodians lazy? Do they not understand the severity of the sanctions? Are they intentionally not acknowledging so that they can delete the data? or something else...more basic.

Here are the top three reasons that custodians fail to acknowledge their Legal Hold notifications and the steps you can take to ensure that Legal Notifications are not ignored and that relevant data is preserved.

1) Custodians are confused and sometimes...

Bashyam Anant | 04 Nov 2014 | 0 comments

Cloud-based business email and business documents are on the rise. Radicati Group estimates that nearly 40% of business email accounts will be cloud-based by 2017. 37% of enterprises expect to use Microsoft O365 applications in the next 24 months. With email and business documents driving most of eDiscovery data, what should you do to prepare for discovering data from increasingly “cloudy” sources? We frame the important issues and best practices in what follows.

Does your cloud data source preserve metadata?

Metadata is critical for eDiscovery but it is unclear if cloud sources preserve dates consistently. Salesforce.com, for example, recommends that its customers backup data and points out that “to preserve old/original create dates, request that...

Zachary Bosin | 06 Oct 2014 | 0 comments

Organizations are facing myriad challenges presented by an ever-increasing pile of diverse data.  Effectively managing for data variability during eDiscovery ensures that you can efficiently get data in and out of the system when you need it most.  We know that our customers are constantly facing time-sensitive requests and to better serve their needs we have re-architected several components of the Symantec eDiscovery Platform to provide greater performance and faster results.

We are pleased to announce the general availability of the Symantec eDiscovery Platform powered by Clearwell 8.0.

This release introduces a dramatically improved Production engine that significantly accelerates how fast customers can complete the eDiscovery process. Additionally, eDiscovery Platform 8.0 provides reviewers with a redesigned user experience that allows them to more quickly identify individual items that may be...

Matthew Nelson | 27 Jun 2014 | 0 comments

holygrail.png

Last week marked the release of the 4th annual Gartner Magic Quadrant for eDiscovery Software report. In the early days of eDiscovery, most companies outsourced almost every size-able project to vendors and law firms so eDiscovery software was barely a blip on the radar screen for technology analysts. Fast forward a few years and the enterprise ediscovery software market has ballooned to a $1.8 billion business in 2014 that is expected to grow to $3.1 billion by 2018.

Growth in the enterprise eDiscovery software business has increased steadily in recent years because most organizations have elected to manage much of the eDiscovery process internally rather than paying vendors and...

Chris Talbott | 04 May 2014 | 0 comments

This week at Symantec Vision 2014 in Las Vegas you will see the Project-X partnership kick-off between the Norton product line and X-MEN Days of Future Past.  Not to be out-done by X-Men, the eDiscovery team at Symantec is coding its own blockbuster storylines for this summer.  We’re working on the direction for the trailer. How do these sound?

“Now able to reach into the corners of the cloud universe, IT data archeologists extract the smoking gun email, barely meeting DOJ deadlines.”  Definitely an action and adventure flick. Maybe Harrison is willing to redeem that crystal skull disaster.

Or how about, eDiscovery administrators are finally free from case management captivity, return to the dating scene…” It has rom-com written all over it.

Or...

Matthew Nelson | 24 Apr 2014 | 0 comments

Contributing Author:  Adam Kuhn

2013 was a rough year for organizations struggling to secure their data. According to the recently published Internet Security Threat Report (ISTR), breaches increased 62% in 2013 and over 552 million identities were exposed. The list of companies experiencing data breaches reads like a “who’s who” of the business world and given the growing sophistication of cyber-criminals, there does not appear to be an immediate end in sight.

The cost of data breaches is astounding. A recent study by the Ponemon Institute estimates that data breaches cost US organizations an average of $5.4...

Matthew Nelson | 20 Dec 2013 | 2 comments

United States District Court Judge for the Northern District of Indiana, Ronald J. Miller, recently addressed what has arguably become the hottest predictive coding issue since Judge Andrew J. Peck’s February 2012 order in Da Silva Moore v. Publicis Groupe. The issue is whether or not parties who use predictive coding technology to assist with document productions should disclose the non-responsive documents used...

Zachary Bosin | 18 Dec 2013 | 0 comments

Symantec is pleased to announce the release of the Clearwell eDiscovery Platform version 7.1.4.  With this release, Clearwell now offers advanced audio processing, search, and review capabilities to drastically accelerate audio discovery efforts. In addition to supporting over 400 file types for electronic discovery, these new capabilities leverage a powerful phonetic engine that can index up to 20,000 hours of recorded audio per day.

Users start the phonetic search workflow by processing audio files and automatically developing an audio search track that is comprised of all the component phonemes present in a given recording.  Phonemes are the small components of sound that make up each word.  Each audio search track is then cataloged in the time-aligned phonetic index which can be searched by reviewers.

Reviewers can search using words and phrases or they can use special operators, such as time-based proximity to other content, to yield the most...