Electronically Stored Information : the Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition.
Material type:
TextPublication details: Boca Raton : CRC Press, 2016.Edition: 2nd edDescription: xvi, 302 pages : illustrations, forms ; 24 cmISBN: - 9781498739597
- 1498739598
- 005.7068
- KF8902 .M38 2016
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
African Court on Human and Peoples' Rights Library | KF8902 .M38 2016 (Browse shelf(Opens below)) | Available | 10208550 |
Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- Author -- CHAPTER 1 WHAT IS ELECTRONIC INFORMATION, AND WHY SHOULD YOU CARE? -- 1.1 Introduction -- 1.2 Electronically Stored Information and the Federal Rules of Civil Procedure -- 1.2.1 Changes to the Federal Rules of Civil Procedure -- 1.2.1.1 Rule 1: Scope and Purpose -- 1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences -- Scheduling Management -- 1.2.1.3 Rule 26 -- 1.2.1.4 Rule 37 Safe Harbor -- 1.2.1.5 Rule 34(b) Producing Documents Procedures -- 1.2.1.6 Rule 33(d) Interrogatories to Parties -- 1.2.1.7 Rule 45 Subpoena -- 1.2.1.8 Form 35 -- 1.2.2 Federal Rules of Evidence -- 1.2.2.1 FRE 502 -- 1.2.2.2 FRE 901 -- 1.2.2.3 FRE 802 -- 1.2.3 Case Law Examples -- 1.2.3.1 Social Media Cases -- 1.2.3.2 Spoliation Cases -- 1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor -- 1.2.3.4 Reasonably Accessible Cases -- 1.2.3.5 Metadata Cases -- 1.2.3.6 Claw-Back and Privilege Cases -- 1.2.3.7 Preservation/Production Cases -- 1.2.3.8 Attorney Competence Cases -- 1.2.4 Other Federal Rules That Affect Electronic Data -- 1.3 Problems with ESI as Discoverable Evidence -- 1.4 Why and How This Affects the Practice of Law -- 1.5 How This Affects Business Organizations -- 1.6 Eff ects on Government Entities -- 1.7 What This Might Mean to You as an Individual -- CHAPTER 2 TRANSLATING GEEK INFORMATION TECHNOLOGY VERSUS EVERYONE ELES -- 2.1 Introduction -- 2.2 Role of IT -- 2.3 Information Technologist's Perspective -- 2.4 Information Technology as an Ally -- 2.5 Translating Geek -- CHAPTER 3 WHERE IS ELECTRONICALLY STORED INFORMATION? IT'S EVERYWHERE! -- 3.1 Introduction -- 3.2 Basics -- 3.3 Database Systems -- 3.4 E-Mail Systems -- 3.5 File and Print Servers -- 3.6 Instant Messaging Services -- 3.7 Mobile Devices.
3.8 Physical Access Records -- 3.9 Telecommunications -- 3.10 Cellular Devices -- 3.11 Digital Video -- 3.12 Internet or Online Data -- 3.13 Storage Media -- 3.14 Internet of Things (IOT) or of Everything (IOE) -- 3.15 Event and System Logs -- 3.16 Desktop Computer Facts -- 3.17 Metadata and Other Nonapparent Data -- 3.18 Conclusion -- CHAPTER 4 WHO'S IN CHARGE HERE? ALLIES, OWNERS, AND STAKEHOLDERS -- 4.1 Introduction -- 4.2 The (Long) List of Stakeholders -- 4.2.1 Information Technology Professionals -- 4.2.2 Legal Staff -- 4.2.3 Records Managers -- 4.2.4 Auditors -- 4.2.5 Human Resources -- 4.2.6 Department Heads, Vice Presidents, and Executives -- 4.2.7 Physical and Information Security Personnel -- 4.3 Ownership of Data -- 4.4 Data Control Considerations -- 4.5 Required Skill Sets and Tools -- CHAPTER 5 THE HUNT RECOVERY AND ACQUISITION -- 5.1 Introduction -- 5.2 Where, Oh Where, Has My Data Gone? -- 5.2.1 Applications as a Vital User Interface -- 5.2.2 Hidden or Restricted Access Data -- 5.2.3 Encrypted Data -- 5.2.4 Deleted or Corrupted Data -- 5.2.5 Proprietary Data or Data Stored on Obsolete Media -- 5.3 Privileged, Sensitive, and Inaccessible Data Management -- 5.4 Proving Ownership and Integrity -- 5.5 Marking Time: How Time Is Recorded and Ensuring Integrity -- 5.6 Legal and Forensically Sound Acquisition -- CHAPTER 6 KEEPING YOUR TREASURES:PRESERVATION AND MANAGEMENT -- 6.1 Introduction -- 6.2 Securing the Data -- 6.3 Access Control and Management -- 6.4 Organization and File Management Techniques -- 6.4.1 Day-to-Day Organization -- 6.4.2 Management of Data over Time -- 6.4.3 Response to Litigation or Audits -- 6.5 Safe Storage Issues and Considerations -- 6.6 Litigation Hold -- 6.7 Spoliation: The Loss of Relevant Data -- 6.8 Automated Technical Solutions -- CHAPTER 7 SHARING IS GOOD:DISSEMINATION AND REPORTING -- 7.1 Introduction.
7.2 Format Issues: Original or Usable? -- 7.3 Mediums for Transfer -- 7.4 Creating Readable Reports -- 7.5 Tips for Depositions and Expert Witness -- 7.6 Conclusion -- APPendix I: LINKS AND REFERENCE FOR MORE INFORMATION -- APPendix II: FROM AND GUIDES -- APPendix III: LINKS TO TECHNICAL SOFTWARE SOLUTIONS -- Index.
There are no comments on this title.
