How to establish a defensible deletion policy

Control risk and manage expenses associated with employee documents and email

Are you a data hoarder? Does your Outlook inbox remind you of a cluttered attic filled with items of questionable use and unknown origin? If you’re like most in-house counsel, you keep as many emails and documents as your IT department will allow. It may well be time for some prudent spring cleaning.

Not only can you defensibly delete your legacy data, but you also should do so as a responsible member of your organization. Now is the perfect time to initiate a controlled electronic data purge and to develop a companywide defensible deletion policy.

Prioritize according to risk

Corporate data resides on desktops, networks, servers, legacy backup tapes and repositories. Understanding and profiling the magnitude of this data is not an easy task. However, knowledge of where data resides and what it contains will drive efficiency and management of the content. Getting a firm grasp on this is the foundation of your defensible deletion playbook.

VP of Information Discovery

author image

Jim McGann

Jim McGann is VP of Information Discovery for Index Engines, a leading electronic discovery provider based in New Jersey. McGann is a frequent writer and...

Bio and more articles

Join the Conversation

Advertisement. Closing in 15 seconds.