1. Written directions to custodians and IT personnel.
2. Protocol for retrieving and preserving electronically-stored information. V
3. Monitoring procedures to ensure that custodians and IT personnel are following the directions and implementing the protocol.
Share this article:
© 2024 Joseph Hage Aaronson LLC
Disclaimer | Attorney Advertising Notice | Legal Notice