You receive a subpoena for the release of all the email received and sent by the company's Chief Security Officer (CSO) for the past three years. You are only able to find one year's worth of email records on the server. You are now concerned about the possible legal implications of not complying with the request. Which of the following should you check BEFORE responding to the request?
A. backup logs and archives
B. data retention policies and guidelines
C. data retention procedures
D. eDiscovery procedures
A
Explanation: Before responding to the request, you should check the backup logs and archives. Older emails may be located in these files.
Data retention policies and guidelines will give details on which data should be retained, how it should be retained, and where it should be retained. Data retention procedures take the data retention policies and guidelines and actually give step-by-step instructions on backing up and storing the data long term. eDiscovery procedures gives step-by-step instructions on the eDiscovery process.
You might also like to view...
List, Process, and Cycle are categories of ________
Fill in the blank(s) with correct word
Recursion is a form of mathematics in which the only values used are true and false.
Answer the following statement true (T) or false (F)