Streamline and Automate e-Discovery and Legal Hold

Assembling data to perform e-discovery and legal holds is a resource-intensive process that slows the important work of IT personnel. Ensuring proper data governance and complying with corporate and government mandates is not optional; but there are ways to speed and enhance these directives.

Complete control and visibility of your organization’s endpoint data is crucial for thorough legal hold and e-discovery initiatives and the foundation of these processes is CrashPlan enterprise endpoint backup.

Endpoint Data Protection Provides Complete Visibility and Control

CrashPlan silently and continuously backs up and protects every file and every version on the device. Endpoint data protection provides a foundation for enterprise data governance processes. The enterprise can now deploy additional data solutions to automate and streamline key phases of e-discovery and legal hold initiatives.

A Case in Point

The very same CrashPlan capabilities used to back up and restore endpoint data have helped enterprises over the past seven years simplify and speed up e-discovery.

E-discovery differs from “hard-copy” evidence because electronic documents are more dynamic and often contain metadata such as time-date stamps, author and recipient information, and file properties. Preserving original content and metadata for electronically stored information is required during e-discovery to eliminate claims of spoliation or tampering with evidence later in the litigation. When data is identified by both parties as relevant to a legal proceeding, these documents are placed under a legal hold at which point they cannot be modified, deleted, erased or destroyed.

With push restore, organizations can easily identify, collect, and preserve data under review. CrashPlan is able streamline the legal hold process by giving admins the ability to adjust and lock data retention and destruction policies for electronic documents under legal hold. These changes are made in real-time, saving time and resources for IT–with no impact on end-user productivity. For organizations managing multiple legal holds, CrashPlan provides visibility, control and ease-of-management—making it simple to remain in compliance with e-discovery requirements.

Push Restore for Faster e-Discovery

The push restore feature allows IT admins to remotely copy an end-user’s backup archive to another device, allowing for quick disclosure to a third party with no interference to the user.

Real-time Policies Support In-Place Legal Hold

CrashPlan enables admins to implement or change information management and retention policies in real-time without disrupting user productivity. Changes to backup frequency, versioning preferences, deleted file archives, permitted file types—and other preferences—can be adjusted and locked down immediately, fully enabling a legal hold effort that requires data to be held at its source.

Audit Trails Prove Chain of Custody

CrashPlan maintains audit trails to track all changes to every file. By maintaining a well-defined chain of custody, admins are able to ensure no tampering occurred after legal hold or e-discovery was put into effect.

API Integrations for Deeper Insight

Enterprises can leverage the Code42 REST API to automatically feed collected data into existing e-discovery applications. The CrashPlan API integration with Splunk Enterprise enables robust control and visibility through detailed analytics, more granular data monitoring and custom reporting.

Easier Compliance Management

CrashPlan’s admin console provides an intuitive, real-time dashboard of the entire backup environment—including policies, profiles and data retention—to make managing data and ensuring compliance easier. From a single-pane, easy-to-use console, administrators can enforce data retention policies, specify backup scheduling and adjust information security settings, across multiple operating systems and devices.

Granular Admin Roles & Controls

CrashPlan’s role-based administration allows enterprises to limit admin access to data under legal hold.

End-to-end data security

When backup is activated on any device, data is automatically encrypted (448-bit) on the source device and remains encrypted during transit and storage. No matter which deployment model an enterprise chooses, the enterprise can opt to keep the encryption keys to the data behind their firewall.

Many features to love.

Multi-Destination Backup … Data Security … Data De-Duplication … Unlimited Backups … Customizable Backup Sets … Data Seeding … Real-Time Reporting … Storage Management … Single Sign-On … Controlled Client Upgrades … Customizable Installers … Flexible File Selection … Mobile Data Access...

See Feature List