08.01.2015 Views

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Electronic Discovery<br />

Company-Enabled<br />

Technologies, Social<br />

Networking Platforms,<br />

and Mobile Devices<br />

By John D. Martin<br />

and Heyward D. Bonyata<br />

Managing Electronic<br />

Discovery and<br />

Compliance Risks<br />

Increased efficiency,<br />

greater revenue,<br />

enhanced security,<br />

and legal defensibility<br />

are the rewards of<br />

a proactive data<br />

management strategy.<br />

Cloud computing, SharePoint, social networking websites,<br />

e-mail, text messages, and Twitter are just a few of<br />

the ways that employees collaborate, create, store, and<br />

instantly transmit ideas, images, and information. In<br />

today’s economic climate where market<br />

conditions and stiff competition demand<br />

quick responses, high productivity, and<br />

internal efficiencies, technology offers<br />

enormous value; however, it also carries<br />

with it significant business and legal<br />

risks. To implement and respond to rapidly<br />

evolving business technologies effectively,<br />

it is critical for counsel to have a good<br />

grasp of the methods and means by which<br />

employees are communicating, as well as<br />

to understand the legal risk factors and<br />

mitigation strategies associated with those<br />

methods and means.<br />

Communication Technology<br />

To mitigate the legal risks associated with<br />

collaborative technologies counsel need to<br />

understand cloud computing, Enterprise<br />

2.0, and basic social networking platforms.<br />

Cloud Computing<br />

Some define cloud computing narrowly<br />

as an updated version of utility computing—or<br />

virtual servers available over the<br />

Internet—while others argue that anything<br />

hosted outside a firewall is “in the<br />

cloud,” including conventional outsourcing.<br />

<strong>The</strong> National Institute of Standards<br />

and Technology (NIST) defines cloud computing<br />

as “a model for enabling convenient,<br />

on- demand network access to a shared<br />

pool of configurable computing resources<br />

(e.g., networks, servers, storage, applications,<br />

and services) that can be rapidly<br />

provisioned and released with minimal<br />

management effort or service provider<br />

interaction.” Peter Mell & Tim Grance, <strong>The</strong><br />

NIST Definition of Cloud Computing: Recommendations<br />

of the National Institute of<br />

Standards and Technology 3, NIST Special<br />

Publication 800-145, (Nat’l Inst. of Standards<br />

& Technology Sept. 2011), http://csrc.<br />

nist.gov/ publications/nistpubs/800-145/SP800-<br />

145.pdf. Cloud computing makes it easier to<br />

communicate and work together on documents,<br />

calendars, and other collaborative<br />

projects. Employees of companies who<br />

use cloud computing can access information<br />

and run software applications wher-<br />

24 ■ <strong>For</strong> <strong>The</strong> <strong>Defense</strong> ■ <strong>February</strong> <strong>2012</strong><br />

■ John D. Martin and Heyward D. Bonyata are attorneys at Nelson Mullins Riley & Scarborough, LLP based<br />

in Columbia, South Carolina. Mr. Martin is the leader of the firm’s Encompass E-Discovery and Document<br />

Review Solutions division, and Ms. Bonyata serves as the Encompass Operations Manager. Both authors are<br />

members of <strong>DRI</strong>’s Electronic Discovery Committee, for which Mr. Martin also serves as publications chair.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!