This Article 
 Bibliographic References 
 Add to: 
E-Discovery: Identifying and Mitigating Security Risks during Litigation
July/August 2008 (vol. 10 no. 4)
pp. 20-25
Faith M. Heikkila, Pivot Group
When producing electronically stored information (ESI) in response to lawsuits, businesses face several security risks as well as legal requirements they must satisfy. Customized document management programs and e-discovery policies are key tools in protecting against inadvertent disclosure as well as meeting business and legal needs.

1. J.M. Redgrave et al., "The Sedona Principles: Second Edition—Best Practices Recommendations &Principles for Addressing Electronic Document Production," white paper, The Sedona Conf., 2007, pp.1–104; TSC_PRINCP_2nd_ed_607.pdf.
2. L. Volonino, J.C. Sipior, and B.T. Ward, "Managing the Lifecycle of Electronically Stored Information," Information Systems Management, vol. 24, no. 3, 2007, pp. 231–238.
3. N. Swartz, "Firms Unprepared for E-Discovery," Information Management J., vol. 41, no. 6, 2007, p. 6.
4. R. Herold, "E-Discovery Quagmires," Computer Security Inst. Alert, Feb. 2007, pp. 10–15.
5. J. Isaza, "E-Discovery Compels: A Seat for RIM at the Counsel Table," Information Management J., vol. 41, no. 1, 2007, pp. 46–49.
6. T.Y. Allman et al., "The Sedona Conference Commentary on Email Management: Guidelines for the Selection of Retention Policy," The Sedona Conf. J., vol. 8, Fall 2007, pp. 239–250.
7. J.J. Isaza, "Determining the Scope of Legal Holds: Waypoints for Navigating the Road Ahead," Information Management J., vol. 42, no. 2, 2008, pp. 34–40.
8. M.E. O'Neill, K.D. Behre, and A.W. Nergaard, "New E-Discovery Rules: How Companies Should Prepare," Intellectual Property &Technology Law J., vol. 19, no. 2, 2007, pp. 13–16.

Index Terms:
electronically stored information, ESI, legal issues, IT, information technology, information security, information storage and retrieval, unauthorized access
Faith M. Heikkila, "E-Discovery: Identifying and Mitigating Security Risks during Litigation," IT Professional, vol. 10, no. 4, pp. 20-25, July-Aug. 2008, doi:10.1109/MITP.2008.67
Usage of this product signifies your acceptance of the Terms of Use.