IT Management  >   Systems Operations  >   Data Management  >  

Electronic Evidence

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Evidence White Papers (View All Report Types)
 
Integrating Social Media Into Your Content Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Gartner predicts that by 2013 half of all organizations will be asked to provide content from social media sources for e-discovery lawsuits, yet most organizations’ social media management policies are non-existent or counter-productive. Find out how to protect yourself from the top concerns that accompany social media.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Best Practices in ECM Document Archive Migration
sponsored by Xenos Group Inc.
WHITE PAPER: The purpose of this white paper is to outline the challenges of migrating documents from enterprise content management (ECM) systems, educate the reader, and provide best practices that ensure success.
Posted: 09 Jun 2009 | Published: 01 Nov 2007

Xenos Group Inc.

Records Management: A Real World Guide
sponsored by IBM ECM
WHITE PAPER: Read this white paper to learn how records management as part of an enterprise content management (ECM) solution delivers substantial ROI through reduction in corporate risk, lower operational costs, and improved productivity.
Posted: 05 Sep 2007 | Published: 05 Sep 2007

IBM ECM

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies
sponsored by FTI Technology
WHITE PAPER: In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set.
Posted: 16 Nov 2009 | Published: 04 Nov 2009

FTI Technology

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection
sponsored by Symantec Corporation
WHITE PAPER: According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Symantec Corporation

Email Archiving: A Proactive Approach to e-Discovery
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them.
Posted: 04 Jul 2008 | Published: 01 Jul 2008

Proofpoint, Inc.

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

MarketScope for E-Discovery Software Product Vendors
sponsored by Clearwell Systems
WHITE PAPER: Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.
Posted: 18 Nov 2010 | Published: 21 Dec 2009

Clearwell Systems

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement