Amazon cover image
Image from Amazon.com

Electronically Stored Information : the Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition.

By: Material type: TextPublication details: Boca Raton : CRC Press, 2016.Edition: 2nd edDescription: xvi, 302 pages : illustrations, forms ; 24 cmISBN:
  • 9781498739597
  • 1498739598
Subject(s): Additional physical formats: Print version:: Electronically Stored Information : The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition.DDC classification:
  • 005.7068
LOC classification:
  • KF8902 .M38 2016
Online resources:
Contents:
Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- Author -- CHAPTER 1 WHAT IS ELECTRONIC INFORMATION, AND WHY SHOULD YOU CARE? -- 1.1 Introduction -- 1.2 Electronically Stored Information and the Federal Rules of Civil Procedure -- 1.2.1 Changes to the Federal Rules of Civil Procedure -- 1.2.1.1 Rule 1: Scope and Purpose -- 1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences -- Scheduling Management -- 1.2.1.3 Rule 26 -- 1.2.1.4 Rule 37 Safe Harbor -- 1.2.1.5 Rule 34(b) Producing Documents Procedures -- 1.2.1.6 Rule 33(d) Interrogatories to Parties -- 1.2.1.7 Rule 45 Subpoena -- 1.2.1.8 Form 35 -- 1.2.2 Federal Rules of Evidence -- 1.2.2.1 FRE 502 -- 1.2.2.2 FRE 901 -- 1.2.2.3 FRE 802 -- 1.2.3 Case Law Examples -- 1.2.3.1 Social Media Cases -- 1.2.3.2 Spoliation Cases -- 1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor -- 1.2.3.4 Reasonably Accessible Cases -- 1.2.3.5 Metadata Cases -- 1.2.3.6 Claw-Back and Privilege Cases -- 1.2.3.7 Preservation/Production Cases -- 1.2.3.8 Attorney Competence Cases -- 1.2.4 Other Federal Rules That Affect Electronic Data -- 1.3 Problems with ESI as Discoverable Evidence -- 1.4 Why and How This Affects the Practice of Law -- 1.5 How This Affects Business Organizations -- 1.6 Eff ects on Government Entities -- 1.7 What This Might Mean to You as an Individual -- CHAPTER 2 TRANSLATING GEEK INFORMATION TECHNOLOGY VERSUS EVERYONE ELES -- 2.1 Introduction -- 2.2 Role of IT -- 2.3 Information Technologist's Perspective -- 2.4 Information Technology as an Ally -- 2.5 Translating Geek -- CHAPTER 3 WHERE IS ELECTRONICALLY STORED INFORMATION? IT'S EVERYWHERE! -- 3.1 Introduction -- 3.2 Basics -- 3.3 Database Systems -- 3.4 E-Mail Systems -- 3.5 File and Print Servers -- 3.6 Instant Messaging Services -- 3.7 Mobile Devices.
3.8 Physical Access Records -- 3.9 Telecommunications -- 3.10 Cellular Devices -- 3.11 Digital Video -- 3.12 Internet or Online Data -- 3.13 Storage Media -- 3.14 Internet of Things (IOT) or of Everything (IOE) -- 3.15 Event and System Logs -- 3.16 Desktop Computer Facts -- 3.17 Metadata and Other Nonapparent Data -- 3.18 Conclusion -- CHAPTER 4 WHO'S IN CHARGE HERE? ALLIES, OWNERS, AND STAKEHOLDERS -- 4.1 Introduction -- 4.2 The (Long) List of Stakeholders -- 4.2.1 Information Technology Professionals -- 4.2.2 Legal Staff -- 4.2.3 Records Managers -- 4.2.4 Auditors -- 4.2.5 Human Resources -- 4.2.6 Department Heads, Vice Presidents, and Executives -- 4.2.7 Physical and Information Security Personnel -- 4.3 Ownership of Data -- 4.4 Data Control Considerations -- 4.5 Required Skill Sets and Tools -- CHAPTER 5 THE HUNT RECOVERY AND ACQUISITION -- 5.1 Introduction -- 5.2 Where, Oh Where, Has My Data Gone? -- 5.2.1 Applications as a Vital User Interface -- 5.2.2 Hidden or Restricted Access Data -- 5.2.3 Encrypted Data -- 5.2.4 Deleted or Corrupted Data -- 5.2.5 Proprietary Data or Data Stored on Obsolete Media -- 5.3 Privileged, Sensitive, and Inaccessible Data Management -- 5.4 Proving Ownership and Integrity -- 5.5 Marking Time: How Time Is Recorded and Ensuring Integrity -- 5.6 Legal and Forensically Sound Acquisition -- CHAPTER 6 KEEPING YOUR TREASURES:PRESERVATION AND MANAGEMENT -- 6.1 Introduction -- 6.2 Securing the Data -- 6.3 Access Control and Management -- 6.4 Organization and File Management Techniques -- 6.4.1 Day-to-Day Organization -- 6.4.2 Management of Data over Time -- 6.4.3 Response to Litigation or Audits -- 6.5 Safe Storage Issues and Considerations -- 6.6 Litigation Hold -- 6.7 Spoliation: The Loss of Relevant Data -- 6.8 Automated Technical Solutions -- CHAPTER 7 SHARING IS GOOD:DISSEMINATION AND REPORTING -- 7.1 Introduction.
7.2 Format Issues: Original or Usable? -- 7.3 Mediums for Transfer -- 7.4 Creating Readable Reports -- 7.5 Tips for Depositions and Expert Witness -- 7.6 Conclusion -- APPendix I: LINKS AND REFERENCE FOR MORE INFORMATION -- APPendix II: FROM AND GUIDES -- APPendix III: LINKS TO TECHNICAL SOFTWARE SOLUTIONS -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books African Court on Human and Peoples' Rights Library KF8902 .M38 2016 (Browse shelf(Opens below)) Available 10208550

Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- Author -- CHAPTER 1 WHAT IS ELECTRONIC INFORMATION, AND WHY SHOULD YOU CARE? -- 1.1 Introduction -- 1.2 Electronically Stored Information and the Federal Rules of Civil Procedure -- 1.2.1 Changes to the Federal Rules of Civil Procedure -- 1.2.1.1 Rule 1: Scope and Purpose -- 1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences -- Scheduling Management -- 1.2.1.3 Rule 26 -- 1.2.1.4 Rule 37 Safe Harbor -- 1.2.1.5 Rule 34(b) Producing Documents Procedures -- 1.2.1.6 Rule 33(d) Interrogatories to Parties -- 1.2.1.7 Rule 45 Subpoena -- 1.2.1.8 Form 35 -- 1.2.2 Federal Rules of Evidence -- 1.2.2.1 FRE 502 -- 1.2.2.2 FRE 901 -- 1.2.2.3 FRE 802 -- 1.2.3 Case Law Examples -- 1.2.3.1 Social Media Cases -- 1.2.3.2 Spoliation Cases -- 1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor -- 1.2.3.4 Reasonably Accessible Cases -- 1.2.3.5 Metadata Cases -- 1.2.3.6 Claw-Back and Privilege Cases -- 1.2.3.7 Preservation/Production Cases -- 1.2.3.8 Attorney Competence Cases -- 1.2.4 Other Federal Rules That Affect Electronic Data -- 1.3 Problems with ESI as Discoverable Evidence -- 1.4 Why and How This Affects the Practice of Law -- 1.5 How This Affects Business Organizations -- 1.6 Eff ects on Government Entities -- 1.7 What This Might Mean to You as an Individual -- CHAPTER 2 TRANSLATING GEEK INFORMATION TECHNOLOGY VERSUS EVERYONE ELES -- 2.1 Introduction -- 2.2 Role of IT -- 2.3 Information Technologist's Perspective -- 2.4 Information Technology as an Ally -- 2.5 Translating Geek -- CHAPTER 3 WHERE IS ELECTRONICALLY STORED INFORMATION? IT'S EVERYWHERE! -- 3.1 Introduction -- 3.2 Basics -- 3.3 Database Systems -- 3.4 E-Mail Systems -- 3.5 File and Print Servers -- 3.6 Instant Messaging Services -- 3.7 Mobile Devices.

3.8 Physical Access Records -- 3.9 Telecommunications -- 3.10 Cellular Devices -- 3.11 Digital Video -- 3.12 Internet or Online Data -- 3.13 Storage Media -- 3.14 Internet of Things (IOT) or of Everything (IOE) -- 3.15 Event and System Logs -- 3.16 Desktop Computer Facts -- 3.17 Metadata and Other Nonapparent Data -- 3.18 Conclusion -- CHAPTER 4 WHO'S IN CHARGE HERE? ALLIES, OWNERS, AND STAKEHOLDERS -- 4.1 Introduction -- 4.2 The (Long) List of Stakeholders -- 4.2.1 Information Technology Professionals -- 4.2.2 Legal Staff -- 4.2.3 Records Managers -- 4.2.4 Auditors -- 4.2.5 Human Resources -- 4.2.6 Department Heads, Vice Presidents, and Executives -- 4.2.7 Physical and Information Security Personnel -- 4.3 Ownership of Data -- 4.4 Data Control Considerations -- 4.5 Required Skill Sets and Tools -- CHAPTER 5 THE HUNT RECOVERY AND ACQUISITION -- 5.1 Introduction -- 5.2 Where, Oh Where, Has My Data Gone? -- 5.2.1 Applications as a Vital User Interface -- 5.2.2 Hidden or Restricted Access Data -- 5.2.3 Encrypted Data -- 5.2.4 Deleted or Corrupted Data -- 5.2.5 Proprietary Data or Data Stored on Obsolete Media -- 5.3 Privileged, Sensitive, and Inaccessible Data Management -- 5.4 Proving Ownership and Integrity -- 5.5 Marking Time: How Time Is Recorded and Ensuring Integrity -- 5.6 Legal and Forensically Sound Acquisition -- CHAPTER 6 KEEPING YOUR TREASURES:PRESERVATION AND MANAGEMENT -- 6.1 Introduction -- 6.2 Securing the Data -- 6.3 Access Control and Management -- 6.4 Organization and File Management Techniques -- 6.4.1 Day-to-Day Organization -- 6.4.2 Management of Data over Time -- 6.4.3 Response to Litigation or Audits -- 6.5 Safe Storage Issues and Considerations -- 6.6 Litigation Hold -- 6.7 Spoliation: The Loss of Relevant Data -- 6.8 Automated Technical Solutions -- CHAPTER 7 SHARING IS GOOD:DISSEMINATION AND REPORTING -- 7.1 Introduction.

7.2 Format Issues: Original or Usable? -- 7.3 Mediums for Transfer -- 7.4 Creating Readable Reports -- 7.5 Tips for Depositions and Expert Witness -- 7.6 Conclusion -- APPendix I: LINKS AND REFERENCE FOR MORE INFORMATION -- APPendix II: FROM AND GUIDES -- APPendix III: LINKS TO TECHNICAL SOFTWARE SOLUTIONS -- Index.

There are no comments on this title.

to post a comment.

African Court on Human and Peoples' Rights | For Inquiries Contact » +255 272 510 510