6 eDiscovery Webinar: Can You Secure the Infrastructure Around the Data You Must Save?

eDiscovery Webinar: Can You Secure the Infrastructure Around the Data You Must Save?

William Morriss is an Associate of Frost Brown Todd LLC in the Intellectual Property Department also a member of my firm's information management and electronic discovery practice group.. He has a focus on subject matter related to computer software, including patent prosecution, patent litigation, and licensing transactions. Mr. Morriss is approved to practice before the United States Patent and Trademark Office and holds a degree in computer science.

In this webinar, we will explain why there's more to electronic discovery than just putting a litigation hold on document destruction. Mr. Morriss will share the obligations litigants often need to require of service providers and technology personnel to produce evidentiary data they would not otherwise collect. In certain cases this could extend to providing the underlying hardware for inspection if the data originally stored on that hardware is alleged to be unrecoverable. He'll also share why individuals responsible for data preservation need to understand the potential risk of storing data in formats that are difficult to access, including the need to produce far more information than might otherwise be necessary.

Joining William will be one of Ecora Software's senior system engineers. They will share how Ecora's Auditor Professional™ 4.5 can establish a comprehensive understanding of your infrastructure's configuration, show how firms can create policies and rules validating controls around critical data are followed, identify gaps in your present configuration, and how to generate reports validating compliance to external regulations or internal policies as evidence for clients and internal and external auditors.

What we'll cover:

  • Identifying where data is stored in your systems
  • Controlling data by understanding how the hardware it rests in is configured
  • Ensuring data protection goes beyond storage
  • Using a configuration auditing and compliance reporting solution to protect access to stored data
  • When you can be required to capture data, even ephemeral data, from vendors
  • How data storage decisions can minimize the amount of material you need to produce

* Your business email acts as your login. Your password must be at least 6 characters.

Existing user


New registration

Business Email:
Phone Ext.:
How Did You Hear About Us:
# of Servers in Location:
Current Project Initiative:

Click here if you experience JavaScript problems