publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/669172
LITIGATION AND PRACTICE SUPPORT 21 WWW.ILTANET.ORG | ILTA WHITE PAPER Auditing E-Discovery for Effectiveness and Efficiency tools or storage environments. The IS auditor reviews these arrangements. Where there is historic information, the auditor tests service provider performance against the contract and requirements outlined in the e-discovery plan. The auditor also identifies and reviews instances where e-discovery issues were raised, including the timeliness and completeness of problem reporting and the effectiveness of problem escalation procedures. Tools and Software Effectiveness The tools and soware available to support e-discovery are rapidly advancing as big data and business analytics tools become more commonplace. Modern tools using advanced artificial intelligence engines to explore data across environments can identify items that match discovery criteria. More traditional tools such as data dictionaries and document taxonomies in content management systems are still beneficial. The IS auditor determines: » What tools are used » How they are implemented » Who maintains them » Who has access rights » Whether soware tools are at current release levels » What useful functionality is missing for non-current packages In preparing for the audit, the auditor should have explored what soware and tools are available but not used as part of the current e-discovery action plan implementation. E-Discovery Audit Benefits Recent industry reports indicate that slightly more than half of organizations spend more than one million dollars on e-discovery annually –– rather a lot in these times of cost-cuing and efficiency. What is oen missing is a holistic view of e-discovery requirements and the capability to find efficiencies in e-discovery while also reducing risk. An auditor's independent assessment of e-discovery performance can provide the view that executives need to manage discovery risk effectively and line managers need to implement processes and procedures, all of which lead to beer results. ILTA RON HALE Ron Hale Ph.D., CISM is the Chief Knowledge Officer for ISACA, an international association with 140,000 global members who are engaged in information security and cybersecurity, information systems audits, information systems risk management, and the governance of enterprise IT. Ron has more than 30 years of experience leading security and risk management activities as an information security manager and consultant. Contact him at rhale@isaca.org.