Home Add to Favorite Contact Submit  
             24 November, 2020

Category:  Articles » Computers » Data Recovery


Email - The Holster of the Smoking Gun

         Views: 1903
2008-05-10 04:39:45     
Article by Teena Townsend

When it comes to understanding the policies by which a business truly operates, it is not necessarily from those documented in formally prepared Word documents or PDFs posted on the company Intranet. In fact, it is the informal messages between staff in emails that override these formal guidelines that dictate and document behaviour and policy. Emails provide an "audit" trail of the thinking, morals and practices that employees follow on a day by day basis. They may differ, sometimes widely, from the formal policies, and they may also change over the life of an organization. They could even differ between departments in larger companies. The more senior the person sending the email, the more weight the informal policy will have, irrespective of the content of the formal policy. Should the "policy" be the basis for defending a legal action, this inconsistency between formal and informal policies can be brought into question. Understandably, access to these informal policies is vital in for the legal team to prepare a suitable defense.

A train of enquiry could develop from emails that were recorded last week, last month or last year. A legal team is looking for the smoking gun, as early as possible in the litigation process, and whilst all manner of data may contain it, email is the one area that is most common. With much of the online email data being archived or deleted after a short to moderate period of time, having snapshots of the email system at various older points in time is vital.

Such email system snapshots are recorded in the backups organizations routinely take and retain for months and years - much longer than the online expiry of mail data.

When the legal team is preparing its defense, the lawyers don't really care for right or wrong. They need to know the facts - and as soon as possible.

Picture this. A defendant, a senior manager in a large government department, tells his lawyer, "There's no way we could have discriminated against that employee. Our official policies state that we will treat each employee with respect and fair and equal dealing. And we always follow these guidelines."

The lawyer questions, "Are you sure that you or no one in your management team could have inadvertently said something that would make him want to sue you for wrongful dismissal?" "Not at all," the manager answers. "Check our email systems if you want. There's no record of any such behaviour either."

Armed with this, the lawyer prepares a defense for the case on the basis that the management of the organization operated fairly and without bias against the employee. The IT department as directed by the legal team may even index and scan through the entire contents of the online email system and, as expected, find no evidence to link any inappropriate behaviour between the management and the employee on this matter.

Imagine when they get to court and the employee's lawyer tables a document they found only recently which is a hardcopy of an email documenting the discrimination that occurred. The defense attorney is floored, and glares angrily at his client, red-faced and sheepish. The unavailable evidence is enough to lose the case for them.

Under such circumstances, the only reason why the department no longer had an online record of it was because it was purged from the email system six months ago, and the basis of this event was 12 months old.

The investigative team should have searched the backups of last year's emails and found the email in question. With this, the legal team could have formulated a case strategy that manoeuvred around this email. They would have known of its existence, and side-stepped the issue when the email was tabled.

How they do this of course is up to the mastery of the legal team. However, the point is clear. With full knowledge of the facts prior to the case going to court, the legal defence team would be armed with information about the "smoking gun" that has the potential to lose the case for the defendant. Historical emails are key to this.

Any eDiscovery action will require a strategy to search historical data, mostly in emails, to elicit all pertinent facts. Every organization faced with litigation should have their IT department aligned with a service provider who can quickly provide access to the information in the historical data archives to appropriately prepare for a case.

Teena Townsend is the Marketing Manager for SpectrumData, an organization specializing in the storage, recovery, migration and management of legacy, archive and backup data.

Specialized in: Data Migration - Data Processing - Data Transcription - Data Archiving - Data Duplication - Format Conversion - Data Destruction - Degaussing - Data Auditing - Data Management - Data Reformatting - Seismic Data - Magnetic Tape - 9 Track Tape
URL: http://www.spectrumdata.com.au
Print article      Bookmark this page
Related Articles 
Sepaton Data Encryption ideal for financial service companies (Popularity: ): Financial service organizations present some of the most stringent data protection requirements. The nature of their system requires continuous, worldwide access to enormous volumes of data at any given time, whilst simultaneously fulfilling the strict stipulations of the SEC and other regulative bodies, complying with eco-friendly initiatives and effectively managing explosive data growth. Additionally, these must be done in such a way as to ensure the process is economically streamlined, ...
Powerful Utility to Perform MS SQL Backup Database Repair (Popularity: ): SQL Server is one of the finest database management clients that allow storing various things together in the relational manner. Via relational database storage facility, users can easily connect various databases together and in this way process to extract data items is very easy with SQL Server. SQL automatically creates backup of databases to help users in annoying situations. But, when backup files of SQL databases itself became inaccessible SQL ...
Solve Most Asked Query How To Recover Deleted Items From Pen Drive (Popularity: ): Everywhere you look around found technology prevalence, the greatest technology that single handedly has revolutionized data transfer and data storage methods is well-known all over today is USB device or Universal Serial Bus. Pen drive, a small data storage device made data transfer tasks quick and easy medium of data transfer. However, before the arrival of this device data transaction was difficult and tiresome task. The corruption in pen drive ...
How to Restore BKF File in Backup EXEC? Most Selected Answer is Given Here (Popularity: ): Regular Backup A Good Practice: All the data especially the crucial ones should be backed up to save the data from data lose situation. The data within one single file will not always be safe enough. So there is always a need of storing an extra copy and for the Windows users an inbuilt backup facility is available in the name of NTbackup EXEC. For the users the data that ...
How to recover deleted files in windows XP after backup corruption? (Popularity: ): Microsoft doesn’t provide any utility program to recover deleted files in Windows XP after backup corruption and they also don’t provide the solution to the query, ‘How to recover MS backup data from windows XP’, they just provide the inbuilt utility program to back up database. NTbackup utility program by Microsoft is the utility to backup original database of Windows XP. In most of the working areas, backup of database ...

Related Business 
Pro-Tech Outdoors (Popularity: ): Nylon Holster manufacturer. Offers a full line of holsters looking for distributors and gun show holster dealers.
Gun Holsters (Popularity: ): Gun Leather Holsters, Kydex & Cordura Concealment Holsters Directly From Producer. We are working hard to satisfy your holster needs and are producing new innovative models of gun holsters based on years of experience in professional (Police, Military, Spec Ops, Law Enforcement), duty and regular concealment gun wearing.
Self Defend.com (Popularity: ): Self-Defend.com is home to Hidden Holster. This gun holster is uniquely designed for private home security.
Montana Holster and Shoulder Rig (Popularity: ): This shoulder holster and belt is great for bow-hunting, backpacking, horse and ATV riders. Carry your own gun with comfort. All holster and shoulder belts are hand made with Hermann Oak leather and fully lined. All holsters and shoulder belts are constructed by hand using premium American tanned Hermann Oak leather. All products are fully lined using vegetable tanned leather.
Smoking Effects (Popularity: ): Smoking.ygoy.com provides you information on tips to quit cigarette smoking. Know more about the Effects of smoking and tobacco. Smoking statistics are about how much does one spend on smoking, the percent of chemicals present in smoke and the revenue spent on smoking.
Barami Corporation (Popularity: ): Features the Hip Grip gun grips that eliminates the need for a holster.
Galco (Popularity: ): The main holster catalog is an interactive product finder to help you find all our products for your gun.
The Invisible Holster (Popularity: ): Lightweight holster to conceal weapon while at the same time making it quickly accessible.
The Wilderness Tactical Products (Popularity: ): Offers original instructor belt, sling, safepacker holster, ZIP slide holster.
Bedside Holster (Popularity: ): Holster fits either side of the bed and used to hold cell phone, mace, pepper spray, stungun, taser, or pistol.