Advertisement

Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits

  • Youngsoo Kim
  • Namje Park
  • Dowon Hong
Part of the Studies in Computational Intelligence book series (SCI, volume 365)

Summary

More and more enterprises and organizations are adopting Data Loss Prevention (DLP) systems to detect and prevent the unauthorized use and transmission of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network logs that are produced within enterprise, can be included in enterprise’s confidential information. On the other hand, as ESI is included in extent of evidence that become discovery’s target in FRCP taken effect on December 1, 2006, enterprises been always vexing in several litigations are hurrying to adopt systematic ESI administration and confrontation system to prevent a lawsuit from losing owing to failure in duty of presenting related evidences and to maintain their confidences. This paper is about enterprise DLP system having a function of coping with civil suits. We loaded various functions needed at discovery process of civil suit to conventional enterprise DLP system. The proposed system can reduce enterprise’s damage by coping spontaneously about enterprise’s litigation dispute.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    FRCP. Federal Rules of Civil Procedure, http://www.law.cornell.edu/rules/frcp
  3. 3.
    FRCP, Federal Rules of Civil Procedure. Wikipedia, http://en.wikipedia.org/wiki/FRCP
  4. 4.
    Volonino, L., Redpath, I.: e-Discovery for Dummies. Wiley, Chichester (2010)Google Scholar
  5. 5.
  6. 6.
    Cohen, A.I., Edward Kalbaugh, G.: ESI Handbook: Sources. In: Technology and Process, 2010 Edition. Aspen Publishers (2010)Google Scholar
  7. 7.
    Kim, Y., Hong, D., Shin, S.: FRCP and e-Discovery. Weekly Technology Trends. No. 1467 (2010)Google Scholar
  8. 8.
    Kim, Y., Shin, S., Hong, D.: Management, Identification and Preservation of ESI in e-Discovery. In: Digital Forensic Technology Workshop, p. 85 (2010)Google Scholar
  9. 9.
    Electronic Discovery Reference Model, http://edrm.net
  10. 10.
    The Sedona Conference, http://www.thesedonaconference.org
  11. 11.
    Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: Consumer Electronics, ISCE 2006, pp. 1–5 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Youngsoo Kim
    • 1
  • Namje Park
    • 2
  • Dowon Hong
    • 1
  1. 1.Cryptography Research TeamElectronics & Telecommunications Research InstituteDaejeonKorea
  2. 2.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-doKorea

Personalised recommendations