m12s22 - closing keynote - information management and the power of positive destruction

4
Cohasset Associates, Inc. NOTES 2012 Managing Electronic Records Conference 22.1 MER 2012 Session S22: Closing Keynote Information Management and the Power of Positive Destruction 1 Hon. Peter A. Flynn, Circuit Court of Cook County, Illinois, Chancery Division John Jessen, Jessen and Associates, Inc. Hon. Craig B. Shaffer, U.S. Magistrate Judge, District of Colorado Carol Stainbrook, Cohasset Associates, Inc. Kenneth Withers, Esq., The Sedona Conference® Key Components of Defensible Destruction In an environment where your destruction decisions can be secondguessed and where you can never be sure that your decision to destroy information is unassailable, you must develop, integrate, and adhere to a fundamental set of destruction “best practices” in order to optimize your defense of process. 2 Key Components of Defensible Destruction Deletion pursuant to a defined retention schedule Not in violation of a litigation or investigation hold order Follows a defined and repeatable process 3 Advance notification provided to appropriate stakeholders Proper checks & balances: No one person makes the decision Ensure that Delete means Delete When in doubt, stop and determine appropriate route

Upload: mer-conference

Post on 28-Nov-2014

298 views

Category:

Education


1 download

DESCRIPTION

Speakers: Hon. Peter A. Flynn, John Jessen, Hon. Craig B. Shaffer, Carol Stainbrook, Kenneth Withers, Esq. How would you rate the effectiveness of the actions your organization takes to destroy eligible electronically stored information - pursuant to its retention schedule? Is unneeded information being retained, because your organization cannot devise an effective process and obtain authorization to actually delete eligible information? Are you finding that up-to-date retention schedules and a proactive Legal Hold process are still not enough to actually "get to destruction"? In the 2011/12 Cohasset / ARMA International Electronic Records Survey of past MER attendees and ARMA members an astounding 66% ranked their effectiveness for "electronically stored information" as "marginal" or "fair". In addition, the highest goal for the next one to three years - with a 64% ranking - is to "Implement the consistent and routine deletion of ESI according to the retention schedules". Read more: http://www.rimeducation.com/videos/rimondemand.php

TRANSCRIPT

Page 1: M12S22 - Closing Keynote - Information Management and the Power of Positive Destruction

Cohasset Associates, Inc.

NOTES

2012 Managing Electronic Records Conference 22.1

MER 2012

Session S22:  Closing Keynote

Information Management and the Power of Positive Destruction

1

Hon. Peter A. Flynn, Circuit Court of Cook County, Illinois, Chancery Division 

John Jessen, Jessen and Associates, Inc. 

Hon. Craig B. Shaffer, U.S. Magistrate Judge, District of Colorado 

Carol Stainbrook, Cohasset Associates, Inc. 

Kenneth Withers, Esq., The Sedona Conference® 

Key Components of Defensible Destruction

In an environment where your destruction decisions can be second‐guessed and where you can never be sure that your decision to destroy information is unassailable, you must develop, integrate, and adhere to a fundamental set of destruction “best practices” in order to optimize your defense of process. 

2

Key Components of Defensible Destruction

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

3

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

Page 2: M12S22 - Closing Keynote - Information Management and the Power of Positive Destruction

Cohasset Associates, Inc.

NOTES

2012 Managing Electronic Records Conference 22.2

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

Delete pursuant to a defined retention schedule

• What does the retention period need to be based upon?

• Business needs

• Compliance requirements

• Legal needs (non‐litigation)

• Historical needs

• Should schedules address “Records” or all

Key Components of Defensible Destruction

4

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

Should schedules address  Records  or all information?

• Definition of the categories:

• Big buckets

• Business process

• Business purpose/function

• Document/form title

• Any of the above?

Deletion pursuant to a defined retention schedule

Follows a defined and repeatable process

Key Components of Defensible Destruction

Not in violation of a litigation or investigation hold order

• Does the hold process apply to:

• Litigation• Government Investigation• External Audit

• What does “reasonable anticipation of litigation” mean?

• Is proportionality a measure for 

5

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

preservation?

• When defining information to preserve, are the following the same?

• Potentially relevant• Reasonably relevant• Proportionally relevant

• One copy or all copies? 

• “Preserve in place” or “collect to preserve” or either?

Key Components of Defensible Destruction

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

• What does a “defined and repeatable process” mean?

• IT departments may  follow a very defined process when deleting application data…

• …but, users casually delete email, files on network drives, etc.  as part of daily work

• Does this requirement change if:

6

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

• The content owner and the custodian are the same?

• The process is:

• Automated • Semi‐automated, or• Manual?

• Information is for internal use only?

• Is the consistent application of the retention schedule important?

Page 3: M12S22 - Closing Keynote - Information Management and the Power of Positive Destruction

Cohasset Associates, Inc.

NOTES

2012 Managing Electronic Records Conference 22.3

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

Key Components of Defensible Destruction

• Is “advanced notification” sufficient or, is “advanced approval” required?

• How far in advance is enough?

• Does this requirement change if:

• The content owner and the custodian are the same?

• The process is:

7

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

Advance notification provided to appropriate stakeholders

• The process is:

• Automated • Semi‐automated, or• Manual?

• Information is for internal use only?

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

Key Components of Defensible Destruction

• If no one person makes the decision, what are the:

• Checks & balances?• Resources?• Roles?

• Does this requirement change if:

• The content owner and the custodian are the same?

8

Advance notification provided to appropriate stakeholders

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

Proper checks & balances: No one person makes the decision

are the same?

• The process is:

• Automated • Semi‐automated, or• Manual?

• Information is for internal use only?

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

Key Components of Defensible Destruction

• What does “delete” need to mean for your organization?

• Technically unrecoverable

• All copies on specific media

• All copies on all accessible media

• All copies on all media

• What are the system resources required to

9

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

When in doubt, stop and determine appropriate route

Ensure that Delete means Delete

What are the system resources required to accomplish “delete means delete?”

• Does this infer “cleansing” or “sanitizing” the media?

• If so, when?

• Does this standard change for:

• Removable v. stationary media?

• Write‐once v. rewritable media?

Page 4: M12S22 - Closing Keynote - Information Management and the Power of Positive Destruction

Cohasset Associates, Inc.

NOTES

2012 Managing Electronic Records Conference 22.4

Deletion pursuant to a defined retention schedule

Not in violation of a litigation or investigation hold order

Follows a defined and repeatable process

Key Components of Defensible Destruction

• Is the deletion pursuant to a defined retention schedule?

• Is the deletion in violation of a litigation, government investigation, or external audit hold order?

• Is the deletion part of a defined and repeatable process?

10

Advance notification provided to appropriate stakeholders

Proper checks & balances: No one person makes the decision

Ensure that Delete means Delete

When in doubt, stop and determine appropriate route

• Have appropriate stakeholders been identified and notified?

• Are there proper checks and balances in place?

• Do you understand the content and the context of the data in question?

• Is an investigation required?

• If so, how much investigation?

Key Components of Defensible Destruction

In an environment where your destruction decisions can be second‐guessed and where you can never be sure that your decision to destroy information is unassailable, you must develop, integrate, and adhere to a fundamental set of destruction “best practices” in order to optimize your defense of process. 

11

By following such a set of best practice components, you will best be able to defend your process as being a fair,  consistent, and standard practice and not an ad hoc, inappropriate  attempt to destroy information.