How to establish a defensible deletion policy
Are you a data hoarder? Does your Outlook inbox remind you of a cluttered attic filled with items of questionable use and unknown origin?
May 04, 2012 at 06:37 AM
11 minute read
The original version of this story was published on Law.com
Are you a data hoarder? Does your Outlook inbox remind you of a cluttered attic filled with items of questionable use and unknown origin? If you're like most in-house counsel, you keep as many emails and documents as your IT department will allow. It may well be time for some prudent spring cleaning.
Not only can you defensibly delete your legacy data, but you also should do so as a responsible member of your organization. Now is the perfect time to initiate a controlled electronic data purge and to develop a companywide defensible deletion policy.
What is defensible deletion?
As the name suggests, defensible deletions are simply documents and emails that can be freely deleted because they are no longer required for compliance or ongoing business purposes. A defensible deletion policy dictates a standardized process to manage corporate data according to information governance and compliance requirements.
Companies have had strategies to protect and safeguard data for decades, which has led to huge data stockpiles. Employees have been permitted to accumulate massive amounts of data on desktops, including archiving email in local repositories known as PST's. Storage administrators in IT departments frequently add massive silos of disk space to accommodate the saving of more and more files, even storing content from employees that left the company years ago. Archiving and records managers are continually copying important documents and email, too, for long-term retention. Business continuity and backup administrators are replicating all of this content on a weekly basis and archiving it to offsite storage for safekeeping in case of a disaster.
Given these highly redundant procedures, enterprise data is continually copied, sometimes more than once and stashed away throughout an enterprise and in offsite vaults. Thus the overall data store multiplies, growing exponentially forever, if left unchecked by a policy.
This is where a defensive deletion policy can help. To create the policy, inside counsel work with corporate IT and other stakeholders to determine what data needs to be kept for compliance or business reasons, and what can be safely and responsibly deleted.
Implementing a defensible deletion methodology not only manages long term risks and liabilities related to enterprise data assets; it also saves time and expense to support ongoing litigation and e-discovery efforts and reduces data center budget spent on storing and managing data that is no longer useful.
Prioritize according to risk
Corporate data resides on desktops, networks, servers, legacy backup tapes and repositories. Understanding and profiling the magnitude of this data is not an easy task. However, knowledge of where data resides and what it contains will drive efficiency and management of the content. Getting a firm grasp on this is the foundation of your defensible deletion playbook.
A viable way to develop policy is to segment the environments and prioritize the data that represents the most risk and liability as follows:
| Volume of Storage | Data Risk and Liability |
Desktops: | Low | Medium |
Network Servers: | High | Low |
Email Servers: | Low | High |
Legacy Backup Tapes: | High | High |
The highest-risk data environments are typically email servers and legacy tapes. Email is the most common source of evidence produced for litigation. Additionally, email has regulatory and compliance preservation requirements because it is the source of sensitive communication and agreements.
When a company is sued and evidence is collected, email—usually stored on an email server—is usually the first place to look. However copies of email are lurking in many other locations throughout the network. A sensitive email from the CEO, for instance, can reside on the CEO's desktop, a copy on his/her laptop or home PC, a PST file that was archived to a network server, a copy on the email server and, finally, multiple copies clustered away on legacy backup tapes.
Legacy backup tapes contain a snapshot of everything, including email and files, from a particular time period, so they are extremely high risk to keep lying around. Using new technologies enables remediation and indexing of the data on these tapes, so the physical tapes can be eventually destroyed once the responsive content is identified and extracted.
Your policy can initially focus on high risk data and continue down to lower risk items; this makes a monumental task more manageable. A playbook is critical to determining an achievable action plan. Many organizations are overwhelmed when faced with massive volumes of data, including legacy content archived away in old data stores. The playbook breaks down the process and develops an approach that is achievable and measurable.
Managing corporate data, both current and legacy content, is more critical than ever. Defensible deletion of content not required for compliance or operational purposes is justifiably a key focus of chief risk officers and information governance teams worldwide. Many organizations have had legal issues resulting from “hidden” or older data that was discovered during litigation. These documents and email sometimes contains “smoking guns” that prove harmful in the event of current and ongoing litigation.
Don't let this happen to you. Work with stakeholders at your corporation to develop a sound defensible deletion policy which creates boundaries around your data and guides employees appropriately. True, you and your colleagues will have to clean out your virtual attic, but it's certainly better to be proactive than to have a dusty old email or document surface at your organization that causes you an even bigger headache.
Are you a data hoarder? Does your Outlook inbox remind you of a cluttered attic filled with items of questionable use and unknown origin? If you're like most in-house counsel, you keep as many emails and documents as your IT department will allow. It may well be time for some prudent spring cleaning.
Not only can you defensibly delete your legacy data, but you also should do so as a responsible member of your organization. Now is the perfect time to initiate a controlled electronic data purge and to develop a companywide defensible deletion policy.
What is defensible deletion?
As the name suggests, defensible deletions are simply documents and emails that can be freely deleted because they are no longer required for compliance or ongoing business purposes. A defensible deletion policy dictates a standardized process to manage corporate data according to information governance and compliance requirements.
Companies have had strategies to protect and safeguard data for decades, which has led to huge data stockpiles. Employees have been permitted to accumulate massive amounts of data on desktops, including archiving email in local repositories known as PST's. Storage administrators in IT departments frequently add massive silos of disk space to accommodate the saving of more and more files, even storing content from employees that left the company years ago. Archiving and records managers are continually copying important documents and email, too, for long-term retention. Business continuity and backup administrators are replicating all of this content on a weekly basis and archiving it to offsite storage for safekeeping in case of a disaster.
Given these highly redundant procedures, enterprise data is continually copied, sometimes more than once and stashed away throughout an enterprise and in offsite vaults. Thus the overall data store multiplies, growing exponentially forever, if left unchecked by a policy.
This is where a defensive deletion policy can help. To create the policy, inside counsel work with corporate IT and other stakeholders to determine what data needs to be kept for compliance or business reasons, and what can be safely and responsibly deleted.
Implementing a defensible deletion methodology not only manages long term risks and liabilities related to enterprise data assets; it also saves time and expense to support ongoing litigation and e-discovery efforts and reduces data center budget spent on storing and managing data that is no longer useful.
Prioritize according to risk
Corporate data resides on desktops, networks, servers, legacy backup tapes and repositories. Understanding and profiling the magnitude of this data is not an easy task. However, knowledge of where data resides and what it contains will drive efficiency and management of the content. Getting a firm grasp on this is the foundation of your defensible deletion playbook.
A viable way to develop policy is to segment the environments and prioritize the data that represents the most risk and liability as follows:
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllFatal Shooting of CEO Sets Off Scramble to Reassess Executive Security
5 minute readBen & Jerry’s Accuses Corporate Parent of ‘Silencing’ Support for Palestinian Rights
3 minute readShareholder Activists Poised to Pounce in 2025. Is Your Board Ready?
Regulatory Upheaval Is Coming. How Businesses Prepare and Respond Will Separate Winners and Losers
Trending Stories
- 1Call for Nominations: Elite Trial Lawyers 2025
- 2Senate Judiciary Dems Release Report on Supreme Court Ethics
- 3Senate Confirms Last 2 of Biden's California Judicial Nominees
- 4Morrison & Foerster Doles Out Year-End and Special Bonuses, Raises Base Compensation for Associates
- 5Tom Girardi to Surrender to Federal Authorities on Jan. 7
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250