UnitedHealth Group

16
UnitedHealth Group UnitedHealth Group David Yerich David Yerich Director, eDiscovery Director, eDiscovery EMC User Group EMC User Group Tuesday 3/1/2011 Tuesday 3/1/2011

description

UnitedHealth Group. David Yerich Director, eDiscovery EMC User Group Tuesday 3/1/2011. Overview. E.D.R.M. Why UHG Legal chose Kazeon Kazeon and eDiscovery Kazeon and File Management Kazeon and Record Management. Electronic Discovery Reference Model (EDRM). Why Kazeon?. - PowerPoint PPT Presentation

Transcript of UnitedHealth Group

Page 1: UnitedHealth Group

UnitedHealth GroupUnitedHealth Group

David YerichDavid Yerich

Director, eDiscovery Director, eDiscovery

EMC User GroupEMC User Group

Tuesday 3/1/2011Tuesday 3/1/2011

Page 2: UnitedHealth Group

OverviewOverview

E.D.R.M.E.D.R.M. Why UHG Legal chose KazeonWhy UHG Legal chose Kazeon Kazeon and eDiscoveryKazeon and eDiscovery Kazeon and File ManagementKazeon and File Management Kazeon and Record ManagementKazeon and Record Management

Page 3: UnitedHealth Group

Electronic Discovery Reference Electronic Discovery Reference Model (EDRM)Model (EDRM)

Page 4: UnitedHealth Group

Information Information ManagementManagement IdentificationIdentification PreservationPreservation CollectionCollection Analysis, Processing & Analysis, Processing &

ReviewReview

Collect and manage Collect and manage information from information from electronic sources, electronic sources, from initial creation of from initial creation of electronically stored electronically stored information through its information through its final disposition, final disposition, to to mitigate risk and mitigate risk and expenses should expenses should eDiscovery become an eDiscovery become an issue.issue.

Legal team develops Legal team develops and executes plan to and executes plan to identify and validate identify and validate potentially relevant potentially relevant ESI sources, ESI sources, including people and including people and systems.systems.

Ensure ESI is Ensure ESI is protected against protected against inappropriate inappropriate alteration or alteration or destruction. When destruction. When duty to preserve is duty to preserve is triggered, promptly triggered, promptly isolate and protect isolate and protect potentially relevant potentially relevant data in ways that are data in ways that are legally defensible; legally defensible; reasonable; reasonable; proportionate; proportionate; efficient; auditable; efficient; auditable; broad but tailored broad but tailored and mitigate risksand mitigate risks

In a legally In a legally defensible defensible manner,manner, gather gather ESI for further ESI for further processing, processing, review, etc., review, etc., in in litigation matters, litigation matters, governmental governmental inquiries and inquiries and internal internal investigations.investigations.

Analysis: Analysis: Evaluate ESI Evaluate ESI for content and context, for content and context, including key patterns, including key patterns, topics, people and topics, people and discussion to enable discussion to enable litigation teams to make litigation teams to make informed decisions about informed decisions about strategy and scope strategy and scope based on verified data. based on verified data. Processing Processing Reduce the Reduce the volume of ESI and volume of ESI and convert it, if necessary, to convert it, if necessary, to forms suitable for review forms suitable for review and analysis. and analysis. ReviewReview Evaluate ESI for Evaluate ESI for relevance and privilege. relevance and privilege. Develop facts, reduce Develop facts, reduce risk, reduce cost, risk, reduce cost, leverage technology, leverage technology, facilitate collaboration facilitate collaboration and communication.and communication.

Page 5: UnitedHealth Group

Why Kazeon?Why Kazeon?

eDiscovery (core use)eDiscovery (core use) Index / Search Large Sets of DataIndex / Search Large Sets of Data View Indexed Data DirectlyView Indexed Data Directly Quick Implementation Quick Implementation CostCost

File Management / Record Management File Management / Record Management (additional use cases)(additional use cases) Reporting / Act Upon FilesReporting / Act Upon Files PotentialPotential to Identify Record Data to Identify Record Data

Page 6: UnitedHealth Group

eDiscoveryeDiscovery

Page 7: UnitedHealth Group
Page 8: UnitedHealth Group
Page 9: UnitedHealth Group
Page 10: UnitedHealth Group

Basic File ManagementBasic File Management

ReportingReporting– Identify Types of Data on SharesIdentify Types of Data on Shares

Basic Crawl - Objective CriteriaBasic Crawl - Objective Criteria– File Type / ExtensionFile Type / Extension– Created / Modification DatesCreated / Modification Dates– Last Accessed DatesLast Accessed Dates– Owner / GroupsOwner / Groups

ActAct– Copy, Move, DeleteCopy, Move, Delete

Page 11: UnitedHealth Group

Deep File ManagementDeep File Management

ReportingReporting– Identify Potential Risk AreasIdentify Potential Risk Areas

Deep Crawl – Document DataDeep Crawl – Document Data– SSN #’sSSN #’s– Credit Card #’s Credit Card #’s – Confidential or Privileged DesignationsConfidential or Privileged Designations

ActAct– Copy, Move, DeleteCopy, Move, Delete

Page 12: UnitedHealth Group
Page 13: UnitedHealth Group
Page 14: UnitedHealth Group
Page 15: UnitedHealth Group

Identify Records?Identify Records?

Programmatically Identify Data based on a Programmatically Identify Data based on a combination of factors:combination of factors:

Full text searching Full text searching – key words / phraseskey words / phrases

Identified FactorsIdentified Factors– SSN, Credit Card DataSSN, Credit Card Data

Basic MetadataBasic Metadata– Creation / Modification DatesCreation / Modification Dates– File Ownership / Group RightsFile Ownership / Group Rights

Page 16: UnitedHealth Group

The EndThe End

Questions?Questions?