Summary
More and more enterprises and organizations are adopting Data Loss Prevention (DLP) systems to detect and prevent the unauthorized use and transmission of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network logs that are produced within enterprise, can be included in enterprise’s confidential information. On the other hand, as ESI is included in extent of evidence that become discovery’s target in FRCP taken effect on December 1, 2006, enterprises been always vexing in several litigations are hurrying to adopt systematic ESI administration and confrontation system to prevent a lawsuit from losing owing to failure in duty of presenting related evidences and to maintain their confidences. This paper is about enterprise DLP system having a function of coping with civil suits. We loaded various functions needed at discovery process of civil suit to conventional enterprise DLP system. The proposed system can reduce enterprise’s damage by coping spontaneously about enterprise’s litigation dispute.
This work was supported by the IT R&D program of MKE/KEIT[10035157, Development of Digital Forensic Technologies for Real-Time Analysis].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
DLP. Wikipedia, http://en.wikipedia.org/wiki/Data_loss_prevention_software
FRCP. Federal Rules of Civil Procedure, http://www.law.cornell.edu/rules/frcp
FRCP, Federal Rules of Civil Procedure. Wikipedia, http://en.wikipedia.org/wiki/FRCP
Volonino, L., Redpath, I.: e-Discovery for Dummies. Wiley, Chichester (2010)
ESI. Wikipedia, http://en.wikipedia.org/wiki/ESI
Cohen, A.I., Edward Kalbaugh, G.: ESI Handbook: Sources. In: Technology and Process, 2010 Edition. Aspen Publishers (2010)
Kim, Y., Hong, D., Shin, S.: FRCP and e-Discovery. Weekly Technology Trends. No. 1467 (2010)
Kim, Y., Shin, S., Hong, D.: Management, Identification and Preservation of ESI in e-Discovery. In: Digital Forensic Technology Workshop, p. 85 (2010)
Electronic Discovery Reference Model, http://edrm.net
The Sedona Conference, http://www.thesedonaconference.org
Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: Consumer Electronics, ISCE 2006, pp. 1–5 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Y., Park, N., Hong, D. (2011). Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (eds) Computers,Networks, Systems, and Industrial Engineering 2011. Studies in Computational Intelligence, vol 365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21375-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-21375-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21374-8
Online ISBN: 978-3-642-21375-5
eBook Packages: EngineeringEngineering (R0)