SlideShare a Scribd company logo
1 of 9
Information Retention and eDiscovery
Survey
Global Results
Methodology
• Survey performed by ReRez
• 500 global organizations
  – 4 countries
    • United States   200
    • Canada          100
    • United Kingdom 100
    • Germany         100
• Cross-industry




                              2
Key Findings
• Number of companies with no retention policy cut in half
• ESI requests fail a third of the time, with consequences
• No improvement in gap between retention beliefs & practices
• Majority impacted by data privacy laws & regulations
• Inefficient backups still used for archiving & legal holds
Number of companies with no retention policy cut in half
• 60% of organizations have a
  formal retention plan at various
  stages
• Only 34% or organizations report
  that their plan is fully operational
  – 26% are still at various stages of
    implementing
  – A third (33%) were only discussing
    in 2012; 30% in 2011
  – 7% reported no plans in 2012; 14%
    in 2011
ESI requests fail a third of the time, with consequences
• Requests completely or partially
  fail 31% of the time
  – Ability to make timely decisions
    significantly up from 26% in 2011
• Organizations responded to
  requests 17 times in past year
• 44% don’t rate their
  preparedness as
  somewhat/extremely confident
• 75% say they are less than
  ‘extremely responsive’
No improvement in gap between retention beliefs & practices
• 81% say proper information
  retention allows organizations
  to delete information
• However, 42% of backups are
  indefinitely retained
• Organizations often delete
  without considering retention
  policies
Majority impacted by data privacy laws & regulations
• 53% say laws and/or regulations impact archiving and eDiscovery initiatives
Inefficient backups still used for archiving & legal holds
• 38% of data is not
  needed/shouldn't be kept in
  backup
• But 85% of organizations
  routinely perform legal holds in
  backups
• 34% of backup data unnecessary
  due to litigation risk
• 56% of organizations say backup
  storage is used for infinite
  retention dedicated to legal hold
Recommendations
• Adopt a defensible deletion mindset
• Err on the side of fewer, rather than many, retention policies
• Automate privacy, retention and compliance policies to reduce risk
• Implement a solution in which legal holds can override expiry policies
• Don't use backups for long term retention

More Related Content

What's hot

Lamarche Models And Outcomes
Lamarche Models And OutcomesLamarche Models And Outcomes
Lamarche Models And Outcomesprimary
 
Analytics Across the Healthcare Ecosytem
Analytics Across the Healthcare EcosytemAnalytics Across the Healthcare Ecosytem
Analytics Across the Healthcare EcosytemIBM in Healthcare
 
Reinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovationReinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovationIBM in Healthcare
 
Grand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits LandscapeGrand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits LandscapeGrand Rounds
 
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder CollaborationThe State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder CollaborationVeeva Systems
 
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits StrategyNetwork Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits StrategyGrand Rounds
 
Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018MD Ranger, Inc.
 
An IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the CloudAn IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the CloudIBM in Healthcare
 
Your cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and workYour cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and workIBM in Healthcare
 
The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...IBM in Healthcare
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudIBM in Healthcare
 
Monday 6 troels bierman mortensen daintel
Monday 6 troels bierman mortensen   daintelMonday 6 troels bierman mortensen   daintel
Monday 6 troels bierman mortensen daintelMichiel Stoffels
 
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...Bill Kelly
 
ScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&DScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&DBIOVIA
 
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013Winshuttle
 
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012Gigaom
 
Streamlining Study Start-up
Streamlining Study Start-upStreamlining Study Start-up
Streamlining Study Start-upVeeva Systems
 
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...L.E.K. Consulting
 
Collaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical TrialsCollaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical TrialsVeeva Systems
 

What's hot (20)

Lamarche Models And Outcomes
Lamarche Models And OutcomesLamarche Models And Outcomes
Lamarche Models And Outcomes
 
Analytics Across the Healthcare Ecosytem
Analytics Across the Healthcare EcosytemAnalytics Across the Healthcare Ecosytem
Analytics Across the Healthcare Ecosytem
 
Reinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovationReinventing Life Sciences: How emerging ecosystems fuel innovation
Reinventing Life Sciences: How emerging ecosystems fuel innovation
 
Grand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits LandscapeGrand Rounds - Employee Benefits Landscape
Grand Rounds - Employee Benefits Landscape
 
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder CollaborationThe State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
The State of Unifying Clinical Systems, Processes, and Stakeholder Collaboration
 
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits StrategyNetwork Optimization: Why Physician Quality Should Drive Your Benefits Strategy
Network Optimization: Why Physician Quality Should Drive Your Benefits Strategy
 
Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018Looking Ahead to Physician Contracting in 2018
Looking Ahead to Physician Contracting in 2018
 
An IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the CloudAn IBM Perspective: Life Sciences in the Cloud
An IBM Perspective: Life Sciences in the Cloud
 
Your cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and workYour cognitive future: How next-gen computing changes the way we live and work
Your cognitive future: How next-gen computing changes the way we live and work
 
The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...The evolution of life science ecosystems: Five effective innovation approache...
The evolution of life science ecosystems: Five effective innovation approache...
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the Cloud
 
Saving money by doing the right thing
Saving money by doing the right thingSaving money by doing the right thing
Saving money by doing the right thing
 
Monday 6 troels bierman mortensen daintel
Monday 6 troels bierman mortensen   daintelMonday 6 troels bierman mortensen   daintel
Monday 6 troels bierman mortensen daintel
 
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
The Laboratory Analytical and Life Science Instrument Industries: Looking Ahe...
 
ScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&DScienceCloud: Collaborative Workflows in Biologics R&D
ScienceCloud: Collaborative Workflows in Biologics R&D
 
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
Winshuttle and ACCA's Global Budgeting & Planning Survey 2013
 
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012GigaOM Research Sector RoadMap: Healthcare and big data in 2012
GigaOM Research Sector RoadMap: Healthcare and big data in 2012
 
Streamlining Study Start-up
Streamlining Study Start-upStreamlining Study Start-up
Streamlining Study Start-up
 
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
Opportunities and Challenges Associated with Novel Companion Diagnostic Techn...
 
Collaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical TrialsCollaborate Effectively to Transform Clinical Trials
Collaborate Effectively to Transform Clinical Trials
 

Viewers also liked

Los ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXILos ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXIDemys Lara
 
Making my magazine double page spread
Making my magazine double page spreadMaking my magazine double page spread
Making my magazine double page spreadlucyyylouuuuu123
 
Health Stations @ Retail Pharmacies
Health Stations @ Retail PharmaciesHealth Stations @ Retail Pharmacies
Health Stations @ Retail PharmaciesRohit Chohan
 
11 Sac H2 H0210
11 Sac H2 H021011 Sac H2 H0210
11 Sac H2 H0210pfeigle
 
Si ee 8 de marzo
Si ee 8 de marzoSi ee 8 de marzo
Si ee 8 de marzosbmalambo
 
4b03 matematica
4b03 matematica4b03 matematica
4b03 matematicajimena-p
 
The best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAEThe best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAEAl Manara Pharmacy
 
Presentación2
Presentación2Presentación2
Presentación2mcbrayan
 
Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017Roderick Baturi Ramos
 
Моя Клумба
Моя КлумбаМоя Клумба
Моя КлумбаMyKlu
 

Viewers also liked (13)

Los ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXILos ROLES que ha de adoptar el maestro del siglo XXI
Los ROLES que ha de adoptar el maestro del siglo XXI
 
Making my magazine double page spread
Making my magazine double page spreadMaking my magazine double page spread
Making my magazine double page spread
 
Health Stations @ Retail Pharmacies
Health Stations @ Retail PharmaciesHealth Stations @ Retail Pharmacies
Health Stations @ Retail Pharmacies
 
11 Sac H2 H0210
11 Sac H2 H021011 Sac H2 H0210
11 Sac H2 H0210
 
Famine ghost ppt2
Famine ghost ppt2Famine ghost ppt2
Famine ghost ppt2
 
Si ee 8 de marzo
Si ee 8 de marzoSi ee 8 de marzo
Si ee 8 de marzo
 
4b03 matematica
4b03 matematica4b03 matematica
4b03 matematica
 
1997 - General Assembly resolution on Policies and Programmes Involving Youth...
1997 - General Assembly resolution on Policies and Programmes Involving Youth...1997 - General Assembly resolution on Policies and Programmes Involving Youth...
1997 - General Assembly resolution on Policies and Programmes Involving Youth...
 
The best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAEThe best in Pedicure and Manicure since 1923. Now in UAE
The best in Pedicure and Manicure since 1923. Now in UAE
 
Teen suicide
Teen suicideTeen suicide
Teen suicide
 
Presentación2
Presentación2Presentación2
Presentación2
 
Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017Byaheng Wow libraries, philippines 2017
Byaheng Wow libraries, philippines 2017
 
Моя Клумба
Моя КлумбаМоя Клумба
Моя Клумба
 

Similar to 2012 Information Retention and eDiscovery Survey Global Results

Symantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global ResultsSymantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global ResultsSymantec
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectiveTGA Australia
 
The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014Jason Hong
 
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...Mary Bennett
 
Poor processes put patient data at risk
Poor processes put patient data at riskPoor processes put patient data at risk
Poor processes put patient data at riskCureMD
 
Compliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging RegulationCompliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging RegulationMediaPost
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Intralinks
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptxJesse Wilkins
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarConcept Searching, Inc
 
Tips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower HotlineTips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower HotlineCase IQ
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt20214Mohan
 
Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS HIMSS UK
 
The Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data GovernanceThe Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data GovernanceHealth Catalyst
 

Similar to 2012 Information Retention and eDiscovery Survey Global Results (20)

Symantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global ResultsSymantec 2012 Backup and Recovery Flash Poll Global Results
Symantec 2012 Backup and Recovery Flash Poll Global Results
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspective
 
The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014The Privacy and Security Behaviors of Smartphone, at USEC 2014
The Privacy and Security Behaviors of Smartphone, at USEC 2014
 
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
FINAL-MB-NAVEXGlobal-AHASignatureSeries-BenchmarkingYourHealthcarePolicyManag...
 
Poor processes put patient data at risk
Poor processes put patient data at riskPoor processes put patient data at risk
Poor processes put patient data at risk
 
MRDB 7
MRDB 7MRDB 7
MRDB 7
 
Compliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging RegulationCompliance is an Opportunity: Leveraging Regulation
Compliance is an Opportunity: Leveraging Regulation
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
 
Survey Report
Survey ReportSurvey Report
Survey Report
 
Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe
 
eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?eHealth Foundations: Can openEHR Provide One Layer?
eHealth Foundations: Can openEHR Provide One Layer?
 
Change Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 WebinarChange Your Search to Find – SharePoint and Office 365 Webinar
Change Your Search to Find – SharePoint and Office 365 Webinar
 
Tips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower HotlineTips for Implementing a Whistleblower Hotline
Tips for Implementing a Whistleblower Hotline
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt
 
Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS Stephen Lieber – President and CEO, HIMSS
Stephen Lieber – President and CEO, HIMSS
 
The Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data GovernanceThe Data Maze: Navigating the Complexities of Data Governance
The Data Maze: Navigating the Complexities of Data Governance
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Recently uploaded (20)

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

2012 Information Retention and eDiscovery Survey Global Results

  • 1. Information Retention and eDiscovery Survey Global Results
  • 2. Methodology • Survey performed by ReRez • 500 global organizations – 4 countries • United States 200 • Canada 100 • United Kingdom 100 • Germany 100 • Cross-industry 2
  • 3. Key Findings • Number of companies with no retention policy cut in half • ESI requests fail a third of the time, with consequences • No improvement in gap between retention beliefs & practices • Majority impacted by data privacy laws & regulations • Inefficient backups still used for archiving & legal holds
  • 4. Number of companies with no retention policy cut in half • 60% of organizations have a formal retention plan at various stages • Only 34% or organizations report that their plan is fully operational – 26% are still at various stages of implementing – A third (33%) were only discussing in 2012; 30% in 2011 – 7% reported no plans in 2012; 14% in 2011
  • 5. ESI requests fail a third of the time, with consequences • Requests completely or partially fail 31% of the time – Ability to make timely decisions significantly up from 26% in 2011 • Organizations responded to requests 17 times in past year • 44% don’t rate their preparedness as somewhat/extremely confident • 75% say they are less than ‘extremely responsive’
  • 6. No improvement in gap between retention beliefs & practices • 81% say proper information retention allows organizations to delete information • However, 42% of backups are indefinitely retained • Organizations often delete without considering retention policies
  • 7. Majority impacted by data privacy laws & regulations • 53% say laws and/or regulations impact archiving and eDiscovery initiatives
  • 8. Inefficient backups still used for archiving & legal holds • 38% of data is not needed/shouldn't be kept in backup • But 85% of organizations routinely perform legal holds in backups • 34% of backup data unnecessary due to litigation risk • 56% of organizations say backup storage is used for infinite retention dedicated to legal hold
  • 9. Recommendations • Adopt a defensible deletion mindset • Err on the side of fewer, rather than many, retention policies • Automate privacy, retention and compliance policies to reduce risk • Implement a solution in which legal holds can override expiry policies • Don't use backups for long term retention