Skip to main content

Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits

  • Conference paper

Part of the book series: Studies in Computational Intelligence ((SCI,volume 365))

Summary

More and more enterprises and organizations are adopting Data Loss Prevention (DLP) systems to detect and prevent the unauthorized use and transmission of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network logs that are produced within enterprise, can be included in enterprise’s confidential information. On the other hand, as ESI is included in extent of evidence that become discovery’s target in FRCP taken effect on December 1, 2006, enterprises been always vexing in several litigations are hurrying to adopt systematic ESI administration and confrontation system to prevent a lawsuit from losing owing to failure in duty of presenting related evidences and to maintain their confidences. This paper is about enterprise DLP system having a function of coping with civil suits. We loaded various functions needed at discovery process of civil suit to conventional enterprise DLP system. The proposed system can reduce enterprise’s damage by coping spontaneously about enterprise’s litigation dispute.

This work was supported by the IT R&D program of MKE/KEIT[10035157, Development of Digital Forensic Technologies for Real-Time Analysis].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. DLP. Wikipedia, http://en.wikipedia.org/wiki/Data_loss_prevention_software

  2. FRCP. Federal Rules of Civil Procedure, http://www.law.cornell.edu/rules/frcp

  3. FRCP, Federal Rules of Civil Procedure. Wikipedia, http://en.wikipedia.org/wiki/FRCP

  4. Volonino, L., Redpath, I.: e-Discovery for Dummies. Wiley, Chichester (2010)

    Google Scholar 

  5. ESI. Wikipedia, http://en.wikipedia.org/wiki/ESI

  6. Cohen, A.I., Edward Kalbaugh, G.: ESI Handbook: Sources. In: Technology and Process, 2010 Edition. Aspen Publishers (2010)

    Google Scholar 

  7. Kim, Y., Hong, D., Shin, S.: FRCP and e-Discovery. Weekly Technology Trends. No. 1467 (2010)

    Google Scholar 

  8. Kim, Y., Shin, S., Hong, D.: Management, Identification and Preservation of ESI in e-Discovery. In: Digital Forensic Technology Workshop, p. 85 (2010)

    Google Scholar 

  9. Electronic Discovery Reference Model, http://edrm.net

  10. The Sedona Conference, http://www.thesedonaconference.org

  11. Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: Consumer Electronics, ISCE 2006, pp. 1–5 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Y., Park, N., Hong, D. (2011). Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (eds) Computers,Networks, Systems, and Industrial Engineering 2011. Studies in Computational Intelligence, vol 365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21375-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21375-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21374-8

  • Online ISBN: 978-3-642-21375-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics