IT is often asked to collect
key custodian data from one or more enterprise systems.
Not exact matches
View important information about your
data — like file formats, volume, and date ranges — while examining
custodians and
key concepts.
Data maps support preservation by helping you quickly connect key custodians with the data sources in which they most commonly interact to help focus the preservation effo
Data maps support preservation by helping you quickly connect
key custodians with the
data sources in which they most commonly interact to help focus the preservation effo
data sources in which they most commonly interact to help focus the preservation efforts.
So, in a matter of hours upon receiving a legal notice, IT and legal teams can collect and preview a sample
data set, leading to a deeper understanding of both the merits of the case and the
key custodians involved.
One side is «identifying»
key players,
custodians, locations of
data and traceability of
data to individuals and departments.
However, should a
key custodian ignore the hold and delete responsive
data, a judge could very easily determine that stronger preservation measures — such as ESI collection — should have been taken.
Where we have diligently preserved and collected
data from 100
custodians, we should propose to process documents of (say) the 10
key custodians, and review their
data first, before moving on (if ever) to the other 90.
Create a plain - language written hold notice to be sent to
key custodians and
data stewards.