티스토리 뷰
These are:
1. Business users who need information to operate the organization,
For any piece of information one hopes to manage, the primary stakeholder is the business user of that information. We use the term “business” broadly; the same ideas apply to end users of information in organizations whose ultimate goal might not be to generate a profit.
2. IT departments who must implement the mechanics of information management,
Once the business value is established, one must also understand the legal duty attached to a piece of information. The term “legal” should also be read broadly to refer to a wide range of legal and regulatory constraints and obligations, from e-discovery and government regulation, to contractual obligations such as payment card industry requirements.
3. Legal, risk, and regulatory departments who understand the organization’s duty to preserve information beyond its immediate business value.
Finally, IT organizations must manage the information accordingly, ensuring privacy and security as well as appropriate retention as dictated by both business and legal or regulatory requirements.
Even the most primitive business creates information in the course of daily operations, and IT departments spring up to manage the logistics–indeed, one of the biggest challenges in modern organizations is trying to stop individuals from excess storing and securing of information. Legal stakeholders can usually mandate the preservation of what is most critical, though often at great cost. However, it takes the coordinated effort of all three groups to defensibly dispose of a piece of information that has outlived its usefulness, and retain what IS useful in a way that enables accessibility and usability for the business user.
Business, Legal, IT 각각 그들 목적의 IM을 운영하고 있으며 e-Discovery시에는 각 Group이 유기적으로 협력하여야 한다고...Enterprize내의 어디서 어떤 ESI를 어떻게 보관하고 있는지를 보여주고자 함
'eDiscovery' 카테고리의 다른 글
CONTROL TOWER (0) | 2010.07.02 |
---|---|
EnCase e-Discovery (0) | 2010.06.16 |
WHAT IS eDISCOVERY? (0) | 2010.06.11 |
Which one do you want to equip? (0) | 2010.06.11 |
Removing Common Files in E-Discovery Processing: De-NISTing Explained (0) | 2010.06.11 |