Risk
11/21/2006
07:15 PM
Patricia Keefe
Patricia Keefe
Commentary
50%
50%

Making A List And Checking It Twice

Thanksgiving on the doorstep means December is just around the corner, bringing with it expressions of cheery good will to all buttressed by those endless, frantic holiday to-do lists. This year, though, before turning out the lights to hit the company party, IT is going to have to check off one more item, and it's a doozy.

Thanksgiving on the doorstep means December is just around the corner, bringing with it expressions of cheery good will to all buttressed by those endless, frantic holiday to-do lists. This year, though, before turning out the lights to hit the company party, IT is going to have to check off one more item, and it's a doozy.New rules go into effect Dec. 1 governing the process of so-called e-discovery. The regulations create specific requirements for producing electronic documents, protocol for their collection and penalties for failing to produce them. The type of data involved here is pretty broad - it's every thing from email, to instant messages, to memos, to VoIP, Webmail, FTP activity, web pages, and other attachments.

On the surface, this appears to be a business problem, and to put a finer point on it - the legal department's problem, says Sophie Pibouin, COO for Chronicle Solutions, a provider of eDiscovery and content monitoring services. But, like many business problems, addressing it requires a partnership with IT. And that's where you come in.

If your company doesn't have ediscovery nailed, you need to run, not walk, over to the legal department for a sit down. The new regulations require businesses to have a policy that is "appropriate" for the business. But while different businesses may decide they need to focus on different kinds of data - at the technical end of the problem, the needs are pretty similar. We're talking storage, monitoring, archival, and data base systems to start. It's not enough to be able to look up items up based on a key word either - you need to be able to produce data threads and put information into context. And you have to integrate all this stuff. (Alas - there is no one turnkey system.)

If you never get sued, you'll never need to bother with this - but hey, you're in business. You betcha some day your company will be sued. And smart businesses practice risk management. That's really what we're talking about here. So it's worth noting that it's not only the board and shareholders who might have something to say if a lawsuit and it's subsequent requests for electronic documents catches you with your pants down.

Insurance companies have tremendous exposure here, and they make lists too. This year they'll be double checking to make sure clients have the proper policy and procedures in place for capturing, storing, integrating, accessing and sharing this data. So you can see where you better get going if you haven't already started.

The thing is, though, a lot of companies don't seem to know much about this. What about your company? Are you on top of this? Just getting started? Or mostly without a clue? If you've gone through the process of building policy and the technology to support it - do you have any tips, lessons learned that you'd like to share? We'd love to hear from you.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.