Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits
Summary
More and more enterprises and organizations are adopting Data Loss Prevention (DLP) systems to detect and prevent the unauthorized use and transmission of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network logs that are produced within enterprise, can be included in enterprise’s confidential information. On the other hand, as ESI is included in extent of evidence that become discovery’s target in FRCP taken effect on December 1, 2006, enterprises been always vexing in several litigations are hurrying to adopt systematic ESI administration and confrontation system to prevent a lawsuit from losing owing to failure in duty of presenting related evidences and to maintain their confidences. This paper is about enterprise DLP system having a function of coping with civil suits. We loaded various functions needed at discovery process of civil suit to conventional enterprise DLP system. The proposed system can reduce enterprise’s damage by coping spontaneously about enterprise’s litigation dispute.
Preview
Unable to display preview. Download preview PDF.
References
- 1.DLP. Wikipedia, http://en.wikipedia.org/wiki/Data_loss_prevention_software
- 2.FRCP. Federal Rules of Civil Procedure, http://www.law.cornell.edu/rules/frcp
- 3.FRCP, Federal Rules of Civil Procedure. Wikipedia, http://en.wikipedia.org/wiki/FRCP
- 4.Volonino, L., Redpath, I.: e-Discovery for Dummies. Wiley, Chichester (2010)Google Scholar
- 5.ESI. Wikipedia, http://en.wikipedia.org/wiki/ESI
- 6.Cohen, A.I., Edward Kalbaugh, G.: ESI Handbook: Sources. In: Technology and Process, 2010 Edition. Aspen Publishers (2010)Google Scholar
- 7.Kim, Y., Hong, D., Shin, S.: FRCP and e-Discovery. Weekly Technology Trends. No. 1467 (2010)Google Scholar
- 8.Kim, Y., Shin, S., Hong, D.: Management, Identification and Preservation of ESI in e-Discovery. In: Digital Forensic Technology Workshop, p. 85 (2010)Google Scholar
- 9.Electronic Discovery Reference Model, http://edrm.net
- 10.The Sedona Conference, http://www.thesedonaconference.org
- 11.Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 12.Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 13.Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: Consumer Electronics, ISCE 2006, pp. 1–5 (2006)Google Scholar