| 000 | 05480cam a2200373Mi 4500 | ||
|---|---|---|---|
| 999 |
_c5560 _d5560 |
||
| 001 | on1076685075 | ||
| 003 | OCoLC | ||
| 005 | 20200421150329.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||||||| | ||
| 008 | 181120s2016 flu o 000 0 eng d | ||
| 020 |
_a9781498739597 _q(ebk) |
||
| 020 | _a1498739598 | ||
| 020 | _z9781498739580 | ||
| 035 | _a(OCoLC)1076685075 | ||
| 040 |
_aLVT _beng _erda _epn _cTZ-ArACH |
||
| 049 | _aTZAA | ||
| 050 | 4 |
_aKF8902 _b.M38 2016 |
|
| 082 | 0 | 4 | _a005.7068 |
| 100 | 1 | _aMatthews, David R. | |
| 245 | 1 | 0 |
_aElectronically Stored Information : _bthe Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition. |
| 250 | _a2nd ed. | ||
| 260 |
_aBoca Raton : _bCRC Press, _c2016. |
||
| 300 |
_axvi, 302 pages : _billustrations, forms ; _c24 cm |
||
| 505 | 0 | _aCover -- Half Title -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- Author -- CHAPTER 1 WHAT IS ELECTRONIC INFORMATION, AND WHY SHOULD YOU CARE? -- 1.1 Introduction -- 1.2 Electronically Stored Information and the Federal Rules of Civil Procedure -- 1.2.1 Changes to the Federal Rules of Civil Procedure -- 1.2.1.1 Rule 1: Scope and Purpose -- 1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences -- Scheduling Management -- 1.2.1.3 Rule 26 -- 1.2.1.4 Rule 37 Safe Harbor -- 1.2.1.5 Rule 34(b) Producing Documents Procedures -- 1.2.1.6 Rule 33(d) Interrogatories to Parties -- 1.2.1.7 Rule 45 Subpoena -- 1.2.1.8 Form 35 -- 1.2.2 Federal Rules of Evidence -- 1.2.2.1 FRE 502 -- 1.2.2.2 FRE 901 -- 1.2.2.3 FRE 802 -- 1.2.3 Case Law Examples -- 1.2.3.1 Social Media Cases -- 1.2.3.2 Spoliation Cases -- 1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor -- 1.2.3.4 Reasonably Accessible Cases -- 1.2.3.5 Metadata Cases -- 1.2.3.6 Claw-Back and Privilege Cases -- 1.2.3.7 Preservation/Production Cases -- 1.2.3.8 Attorney Competence Cases -- 1.2.4 Other Federal Rules That Affect Electronic Data -- 1.3 Problems with ESI as Discoverable Evidence -- 1.4 Why and How This Affects the Practice of Law -- 1.5 How This Affects Business Organizations -- 1.6 Eff ects on Government Entities -- 1.7 What This Might Mean to You as an Individual -- CHAPTER 2 TRANSLATING GEEK INFORMATION TECHNOLOGY VERSUS EVERYONE ELES -- 2.1 Introduction -- 2.2 Role of IT -- 2.3 Information Technologist's Perspective -- 2.4 Information Technology as an Ally -- 2.5 Translating Geek -- CHAPTER 3 WHERE IS ELECTRONICALLY STORED INFORMATION? IT'S EVERYWHERE! -- 3.1 Introduction -- 3.2 Basics -- 3.3 Database Systems -- 3.4 E-Mail Systems -- 3.5 File and Print Servers -- 3.6 Instant Messaging Services -- 3.7 Mobile Devices. | |
| 505 | 8 | _a3.8 Physical Access Records -- 3.9 Telecommunications -- 3.10 Cellular Devices -- 3.11 Digital Video -- 3.12 Internet or Online Data -- 3.13 Storage Media -- 3.14 Internet of Things (IOT) or of Everything (IOE) -- 3.15 Event and System Logs -- 3.16 Desktop Computer Facts -- 3.17 Metadata and Other Nonapparent Data -- 3.18 Conclusion -- CHAPTER 4 WHO'S IN CHARGE HERE? ALLIES, OWNERS, AND STAKEHOLDERS -- 4.1 Introduction -- 4.2 The (Long) List of Stakeholders -- 4.2.1 Information Technology Professionals -- 4.2.2 Legal Staff -- 4.2.3 Records Managers -- 4.2.4 Auditors -- 4.2.5 Human Resources -- 4.2.6 Department Heads, Vice Presidents, and Executives -- 4.2.7 Physical and Information Security Personnel -- 4.3 Ownership of Data -- 4.4 Data Control Considerations -- 4.5 Required Skill Sets and Tools -- CHAPTER 5 THE HUNT RECOVERY AND ACQUISITION -- 5.1 Introduction -- 5.2 Where, Oh Where, Has My Data Gone? -- 5.2.1 Applications as a Vital User Interface -- 5.2.2 Hidden or Restricted Access Data -- 5.2.3 Encrypted Data -- 5.2.4 Deleted or Corrupted Data -- 5.2.5 Proprietary Data or Data Stored on Obsolete Media -- 5.3 Privileged, Sensitive, and Inaccessible Data Management -- 5.4 Proving Ownership and Integrity -- 5.5 Marking Time: How Time Is Recorded and Ensuring Integrity -- 5.6 Legal and Forensically Sound Acquisition -- CHAPTER 6 KEEPING YOUR TREASURES:PRESERVATION AND MANAGEMENT -- 6.1 Introduction -- 6.2 Securing the Data -- 6.3 Access Control and Management -- 6.4 Organization and File Management Techniques -- 6.4.1 Day-to-Day Organization -- 6.4.2 Management of Data over Time -- 6.4.3 Response to Litigation or Audits -- 6.5 Safe Storage Issues and Considerations -- 6.6 Litigation Hold -- 6.7 Spoliation: The Loss of Relevant Data -- 6.8 Automated Technical Solutions -- CHAPTER 7 SHARING IS GOOD:DISSEMINATION AND REPORTING -- 7.1 Introduction. | |
| 505 | 8 | _a7.2 Format Issues: Original or Usable? -- 7.3 Mediums for Transfer -- 7.4 Creating Readable Reports -- 7.5 Tips for Depositions and Expert Witness -- 7.6 Conclusion -- APPendix I: LINKS AND REFERENCE FOR MORE INFORMATION -- APPendix II: FROM AND GUIDES -- APPendix III: LINKS TO TECHNICAL SOFTWARE SOLUTIONS -- Index. | |
| 650 | 0 |
_aElectronic discovery (Law) _zUnited States. |
|
| 650 | 7 |
_aElectronic discovery (Law) _2fast |
|
| 651 | 7 |
_aUnited States. _2fast |
|
| 776 | 0 | 8 |
_iPrint version: _aMatthews, David R. _tElectronically Stored Information : The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition. _dBoca Raton : Auerbach Publications, 2016 _z9781498739580 |
| 856 | 4 | 0 |
_3ProQuest Ebook Central _uhttps://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4542954 |
| 942 |
_2lcc _cBOOK |
||