Muutke küpsiste eelistusi

E-raamat: Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

(HK Hamilton & Associates, USA)
  • Formaat: 318 pages
  • Ilmumisaeg: 19-Dec-2017
  • Kirjastus: Auerbach Publishers Inc.
  • ISBN-13: 9781315352299
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 55,89 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 318 pages
  • Ilmumisaeg: 19-Dec-2017
  • Kirjastus: Auerbach Publishers Inc.
  • ISBN-13: 9781315352299
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy dataif that is indeed possible. This book is for all of you, whatever your need or interest.

Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition explains the reasons you need to know about electronic data. It also gets into great detail about the how, what, when, and where of what is known in legal circles as electronically stored information (ESI).

With easy-to-understand explanations and guidelines, this book provides the practical understanding you need to effectively manage the complex world of ESI. Whether you are an attorney, judge, paralegal, business manager or owner, or just one of the ever-growing population of computer users, you will benefit from the information presented in this book.

Arvustused

"Matthews has approached e-discovery from a fresh, new perspectiveone that is understandable to the layperson as well as the technologist. ... A must-read for anyone in the information technology and legal professions, the book provides invaluable information to be proactive or reactive in responding to requests of electronically stored information. ... This book goes a long way in removing the intimidation factor between IT, the corporate legal department, and outside counsel. This book should be required reading for anyone in a computer science, information technology, or law-related program, and is now part of the Digital Forensics and the Law course I instruct. If you want to get up to speed on e-discovery and actually understand what you read, youll buy this book." Steve Hailey, President & CEO, CyberSecurity Institute; Digital Forensic Examiner; and Educator

Foreword ix
Preface xi
Acknowledgments xiii
Author xv
Chapter 1 What Is Electronic Information, and Why Should You Care?
1(62)
1.1 Introduction
1(1)
1.2 Electronically Stored Information and the Federal Rules of Civil Procedure
1(49)
1.2.1 Changes to the Federal Rules of Civil Procedure
3(1)
1.2.1.1 Rule 1: Scope and Purpose
3(1)
1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences; Scheduling Management
3(1)
1.2.1.3 Rule 26
4(7)
1.2.1.4 Rule 37 Safe Harbor
11(2)
1.2.1.5 Rule 34(b) Producing Documents Procedures
13(2)
1.2.1.6 Rule 33(d) Interrogatories to Parties
15(1)
1.2.1.7 Rule 45 Subpoena
15(1)
1.2.1.8 Form 35
15(1)
1.2.2 Federal Rules of Evidence
16(1)
1.2.2.1 FRE 502
17(1)
1.2.2.2 FRE 901
17(1)
1.2.2.3 FRE 802
18(1)
1.2.3 Case Law Examples
18(2)
1.2.3.1 Social Media Cases
20(3)
1.2.3.2 Spoliation Cases
23(6)
1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor
29(7)
1.2.3.4 Reasonably Accessible Cases
36(4)
1.2.3.5 Metadata Cases
40(1)
1.2.3.6 Claw-Back and Privilege Cases
41(3)
1.2.3.7 Preservation/Production Cases
44(4)
1.2.3.8 Attorney Competence Cases
48(1)
1.2.4 Other Federal Rules That Affect Electronic Data
49(1)
1.3 Problems with ESI as Discoverable Evidence
50(5)
1.4 Why and How This Affects the Practice of Law
55(4)
1.5 How This Affects Business Organizations
59(1)
1.6 Effects on Government Entities
60(1)
1.7 What This Might Mean to You as an Individual
60(3)
Chapter 2 Translating Geek: Information Technology versus Everyone Else
63(16)
2.1 Introduction
63(1)
2.2 Role of IT
63(9)
2.3 Information Technologist's Perspective
72(4)
2.4 Information Technology as an Ally
76(1)
2.5 Translating Geek
77(2)
Chapter 3 Where Is Electronically Stored Information? It's Everywhere!
79(80)
3.1 Introduction
79(1)
3.2 Basics
80(7)
3.3 Database Systems
87(4)
3.4 E-Mail Systems
91(3)
3.5 File and Print Servers
94(5)
3.6 Instant Messaging Services
99(2)
3.7 Mobile Devices
101(4)
3.8 Physical Access Records
105(4)
3.9 Telecommunications
109(10)
3.10 Cellular Devices
119(7)
3.11 Digital Video
126(4)
3.12 Internet or Online Data
130(14)
3.13 Storage Media
144(3)
3.14 Internet of Things (IOT) or of Everything (IOE)
147(1)
3.15 Event and System Logs
148(1)
3.16 Desktop Computer Facts
149(5)
3.17 Metadata and Other Nonapparent Data
154(3)
3.18 Conclusion
157(2)
Chapter 4 Who's in Charge Here? Allies, Owners, and Stakeholders
159(18)
4.1 Introduction
159(1)
4.2 The (Long) List of Stakeholders
159(6)
4.2.1 Information Technology Professionals
159(3)
4.2.2 Legal Staff
162(1)
4.2.3 Records Managers
163(1)
4.2.4 Auditors
163(1)
4.2.5 Human Resources
164(1)
4.2.6 Department Heads, Vice Presidents, and Executives
164(1)
4.2.7 Physical and Information Security Personnel
165(1)
4.3 Ownership of Data
165(5)
4.4 Data Control Considerations
170(3)
4.5 Required Skill Sets and Tools
173(4)
Chapter 5 The Hunt: Recovery and Acquisition
177(46)
5.1 Introduction
177(1)
5.2 Where, Oh Where, Has My Data Gone?
178(18)
5.2.1 Applications as a Vital User Interface
178(5)
5.2.2 Hidden or Restricted Access Data
183(5)
5.2.3 Encrypted Data
188(2)
5.2.4 Deleted or Corrupted Data
190(1)
5.2.5 Proprietary Data or Data Stored on Obsolete Media
191(5)
5.3 Privileged, Sensitive, and Inaccessible Data Management
196(7)
5.4 Proving Ownership and Integrity
203(8)
5.5 Marking Time: How Time Is Recorded and Ensuring Integrity
211(4)
5.6 Legal and Forensically Sound Acquisition
215(8)
Chapter 6 Keeping Your Treasures: Preservation and Management
223(32)
6.1 Introduction
223(1)
6.2 Securing the Data
223(3)
6.3 Access Control and Management
226(6)
6.4 Organization and File Management Techniques
232(9)
6.4.1 Day-to-Day Organization
232(4)
6.4.2 Management of Data over Time
236(2)
6.4.3 Response to Litigation or Audits
238(3)
6.5 Safe Storage Issues and Considerations
241(5)
6.6 Litigation Hold
246(2)
6.7 Spoliation: The Loss of Relevant Data
248(2)
6.8 Automated Technical Solutions
250(5)
Chapter 7 Sharing Is Good: Dissemination and Reporting
255(12)
7.1 Introduction
255(1)
7.2 Format Issues: Original or Usable?
255(4)
7.3 Mediums for Transfer
259(2)
7.4 Creating Readable Reports
261(3)
7.5 Tips for Depositions and Expert Witness
264(2)
7.6 Conclusion
266(1)
Appendix I Links and References for More Information 267(6)
Appendix II Forms and Guides 273(18)
Appendix III Links to Technical Software Solutions 291(2)
Index 293
David Matthews has worked in the information technology (IT) field since 1992. He began working for the City of Seattle as the technology manager for the Legislative Department (City Council) in 1998. In early 2005, he was selected to be the first Deputy CISO for the city. In his work for the city, he developed and created an incident response plan that is compliant with the National Incident Management System (NIMS)/Incident Command System (ICS); updated and extensively rewrote the citys information security policy; and created and taught training courses on information security and forensics. He created an IT primer for the citys law department as part of his collaboration with them on e-discovery issues.

In 2012, he was recruited by Expedia, Inc. to develop and lead their global cyber incident response team. He created and exercised a plan that integrated with their network response and disaster recovery plans and led a team located both in the United States and India. He retired in 2014 and is now doing consultant work mostly with local governments and critical infrastructure to enhance their cyber response and resiliency capabilities.