eDiscovery Reports

Active Archiving: Hitachi Content Archive Platform
sponsored by Hitachi Vantara
WHITE PAPER: Learn how you can deploy an active archive approach to the long term retention, preservation, retrieval and disposition of critical business content.
Posted: 26 Sep 2006 | Published: 01 Jun 2006

Hitachi Vantara

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

Bruce Silver & Associates: A Practical Approach to Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements.
Posted: 12 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

The IBM ECM Portfolio: Reducing Risk through Effective Information Management
sponsored by IBM ECM
WHITE PAPER: Faced with mounting regulatory pressures and the climbing cost of litigation, businesses in virtually every industry cite compliance as one of their top concerns. Learn how records management can help you effectively achieve compliance requirements.
Posted: 05 Sep 2007 | Published: 01 Jun 2007

IBM ECM

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why!
sponsored by Daegis
PRESENTATION TRANSCRIPT: In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

Daegis

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

Metadata: Bringing Order and Value to Reference Information
sponsored by EMC Corporation
WHITE PAPER: Read this paper to understand how metadata can be used to make it easier to escrow, migrate, manage, and make sense of extremely large reference information archives.
Posted: 07 Aug 2005 | Published: 01 Jun 2005

EMC Corporation

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation