Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(279.92KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
Sundar Krishnan, Ashar Neyaz, Narasimha Shashidhar
Pages - 16 - 30     |    Revised - 31-07-2019     |    Published - 31-08-2019
Volume - 10   Issue - 2    |    Publication Date - August 2019  Table of Contents
MORE INFORMATION
KEYWORDS
Security, eDiscovery, Electronic Discovery Reference Model (EDRM), Electronic Stored Information (ESI), Digital Forensics, Cloud Security, Digital Evidence, Incident Forensics.
ABSTRACT
Litigation these days involves Electronically Stored Information (ESI) for legal purposes. Electronic discovery, also known as eDiscovery, is a process involving legal parties on a case to preserve, collect, review, and exchange electronic information for the purpose of using it as evidence in the case. In the past two decades, the software industry has launched many products catering to eDiscovery. With the advent of cloud computing, storage of electronic data has become cheaper and attractive for eDiscovery needs. With the ever growing technological advances, access to such storage has become simplified for enterprises distributed across the globe. eDiscovery product vendors have embraced the cloud and often allow their products to store and retrieve electronic evidence from the cloud. In this paper, we survey and explore eDiscovery product features focusing on available product security features, security features for evidence protection, incident forensics readiness and cloud forensics. We strive to highlight the challenges in the eDiscovery field when handling vast volumes of electronic evidence and propose incorporating industry best practices in implementing effective security and incident forensics at the product level.
1 Google Scholar 
2 refSeek 
3 ResearchGate 
4 Scribd 
5 SlideShare 
1 Committe on the Judiciary. (1994). "Federal Rules of Civil Procedure 1993," vol. 39, no. 6, Internet: https://www.uscourts.gov/sites/default/files/civil-rules-procedure-dec2017_0.pdf [Jan 08, 2019]
2 The U.S. House of Representatives. (2014). "Federal Rules of Criminal Procedure". Internet: http://www.kyed.uscourts.gov/kyed_GOs/Privacy_Rules.pdf [Jan 20, 2019]
3 U. S. Government, "Federal Rules of Evidence," Legal Ref. Serv. Q., vol. 8, no. 3-4, pp. 219-232, 1988 Internet: https://www.uscourts.gov/sites/default/files/Rules of Evidence [Jan 18, 2019].
4 Zapproved. (2018). "What is the FRCP? | Zapproved," Zapproved, Internet: https://www.zapproved.com/blog/what-is-the-frcp-facts-about-the-federal-rules-of-civil-procedure/ [Jan 11, 2019].
5 The Sedona Conference. (2007). "The Sedona Principles, Second Edition: Best Practices, Recommendations & Principles for Addressing Electronic Document Production (The Sedona Conference Working Group Series, 2007)" Internet: https://sosmt.gov/wp-content/uploads/attachments/A - Sedona Principles Second Edition.pdf?dt=1485383215701&dt=1519325634100 [Jan 04, 2019].
6 H. Marshall Jarrett and E. W. Michael Bailie. (2015). "Prosecuting Computer Crimes," vol. 741, Available: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf [Jan 20, 2019].
7 U. S. Government. (2001). "The USA PATRIOT Act : Preserving Life and Liberty," USA Dep. Justice. Internet: http://www.justice.gov/archive/ll/what_is_the_patriot_act.pdf [Jan 17, 2019]
8 The Senate and House of Representatives of the United States of America. (2008). "One Hundred Sixth Congress of the United States of America TITLE II-IDENTITY THEFT ENFORCEMENT AND RESTITUTION ACT". no. c, pp. 1-13. Internet: https://www.govinfo.gov/content/pkg/BILLS-110hr5938enr/pdf/BILLS-110hr5938enr.pdf [Jan 04, 2019] .
9 Logikcull, "Chapter 2 - Data Preservation and Legal Holds| The Ultimate Guide to eDiscovery". Internet: https://www.logikcull.com/guide/chapter-2-data-preservation-and-legal-holds. [Jan 11, 2019].
10 D. Law, "EDRM Model," Duke Law. Internet: https://www.edrm.net/frameworks-and-standards/edrm-model/. [Jan 11, 2019].
11 A. Pichan, M. Lazarescu, and S. T. Soh. (2015, Jun.). "Cloud forensics: Technical challenges, solutions and comparative analysis," Digit. Investig., vol. 13, pp. 38-57. Available: https://www.sciencedirect.com/science/article/pii/S1742287615000407 [Jan 07, 2019].
12 Exterro. 2017. "E-Discovery Nightmares" Internet: https://www.exterro.com/blog/e-discovery-nightmares-5-experts-tales-of-terror/ [Jan 05, 2019].
13 B. Y. Exterro and C. E. O. Bobby, "4 th Annual Federal Judges Survey Judicial Perspectives on the State of E-Discovery Law and Practice." Internet: https://www.exterro.com/about/news-events/fourth-annual-federal-judges-survey-shows-biggest-problems-in-e-discovery-are-caused-by-mindset-of-practitioners/ [Jan 20, 2019]
14 Exterro. (2018). "The State of eDiscovery 2018" Internet: https://www.exterro.com/about/news-events/state-of-e-discovery-report/ [Jan 06, 2019]
15 S. Jorgensen. (2003). Convergence of Forensics, Ediscovery, Security, & Law. [On-line]. vol. 12, no. 2. Ave Maria School of Law. Internet: https://www.questia.com/library/journal/1G1-383980285/convergence-of-forensics-ediscovery-security [Jan 10, 2019]
16 F. Freiling and B. Schwittay. (2007). "A Common Process Model for Incident Response and Computer Forensics," in IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13. Stuttgart, Germany. [On-line]. pp. 19--40. Available: http://ub-madoc.bib.uni-mannheim.de/23053/ [Jan 14, 2019]
17 S. Park, N. Akatyev, Y. Jang, J. Hwang, D. Kim, W. Yu, H. Shin, C. Han, J. Kim (2018, Mar.). "A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement," Digit. Investig. [On-line]. vol. 24, pp. S93-S100. Available: https://www.sciencedirect.com/science/article/pii/S1742287618300446 [Jan 20, 2019]
18 S. Subashini and V. Kavitha. (2011, Jan.). "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl. [On-line]. vol. 34, no. 1, pp. 1-11. Available: https://www.sciencedirect.com/science/article/pii/S1084804510001281 [Jan 14, 2019]
19 S. Krishnan and L. Chen. (2014). "Legal Concerns and Challenges in Cloud Computing". Internet: http://arxiv.org/abs/1905.10868 [Jun 27 2019].
20 V. Chang and M. Ramachandran. (2016, Jan.). "Towards Achieving Data Security with the Cloud Computing Adoption Framework," IEEE Trans. Serv. Comput. [On-line]. vol. 9, no. 1, pp. 138-151. Available: http://ieeexplore.ieee.org/document/7299312/ [Jan 22, 2019]
21 Jared Coseglia. (2017). "State of the Industry: E-Discovery and Cybersecurity | Law Journal Newsletters". [On-line]. Available: http://www.lawjournalnewsletters.com/sites/lawjournalnewsletters/2017/06/01/state-of-the-industry-e-discovery-and-cybersecurity-3/?slreturn=20190005083511. [Jan 05, 2019].
22 J. Gilliland. (2018). "Designating Privileged and Work Product Materials - CaseFleet". Internet: https://www.casefleet.com/blog/choosing-whats-privileged-or-work-product. [Jan 11, 2019].
23 "People for the Ethical Treatment of Animals, Inc. v. Tri-State Zoologica...tern Maryland, Inc. et al Doc. 102". (1964). Internet: https://cases.justia.com/federal/district-courts/maryland/mddce/1:2017cv02148/396265/102/0.pdf?ts=1541239401 [Jan 12, 2019]
24 G2Crowd. "Best eDiscovery Software in 2019 | G2 Crowd". Internet: https://www.g2crowd.com/categories/ediscovery. [Jan 06, 2019].
25 D. EDRM. "Processing Guide." Internet: http://www.edrm.net/frameworks-and-standards/edrm-model/processing/ [Jan 4, 2019]
26 Amy Bowser-Rollins. (2017). "Electronic Discovery - Indexing". Litigation Support Guru. Internet: https://litigationsupportguru.com/electronic-discovery-indexing. [Jan 08, 2019].
27 "Federal Rules of Civil Procedure," Federal Rules of Civil Procedure, Administrative office of the Federal court System. Internet: http://www.kyed.uscourts.gov/kyed_GOs/Privacy_Rules.pdf. [Aug 8, 2019].
28 D. Law. (2010). "Production Guide | EDRM". EDRM Duke Law. Internet: http://www.edrm.net/frameworks-and-standards/edrm-model/production/. [Jan 08, 2019].
29 S. Williams and A. Gurney. (2016). "The 10 Steps to High Performance eDiscovery" Capax Discovery LLC. Internet: https://cdn2.hubspot.net/hubfs/1946272/Datasheets/10_Steps_for_High_Performance_eDiscovery.pdf [Jan 20, 2019].
Mr. Sundar Krishnan
Sam Houston State University - United States of America
skrishnan@shsu.edu
Mr. Ashar Neyaz
Sam Houston State University - United States of America
Dr. Narasimha Shashidhar
Sam Houston State University - United States of America