{"id":294,"date":"2020-10-18T15:40:33","date_gmt":"2020-10-18T21:40:33","guid":{"rendered":"https:\/\/idsinc.com\/?p=294"},"modified":"2021-11-30T14:12:26","modified_gmt":"2021-11-30T20:12:26","slug":"cross-border-esi-considerations-for-time-sensitive-data-handling","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/cross-border-esi-considerations-for-time-sensitive-data-handling\/","title":{"rendered":"Cross Border ESI: Considerations for Time Sensitive Data Handling"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">By Jim Vaughn, Tim LaTulippe, and Dan Rupprecht on 10\/18\/20 7:00 AM<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In today\u2019s&nbsp;ever-changing world of technology and legal requirements, data handling considerations have become of critical importance.&nbsp;&nbsp;There are&nbsp;multiple&nbsp;levels of consideration including legal obligations, privacy, and logistics.&nbsp;&nbsp;This is one example of how&nbsp;European&nbsp;based clients can carefully and strategically&nbsp;provide&nbsp;data for a US based&nbsp;dispute or litigation.&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\"><em>It should be noted that none of the content here is&nbsp;intended to be&nbsp;legal advice,&nbsp;but rather a demonstration of&nbsp;our technical and industry experience dealing with the transfer of data across borders. Legal issues should&nbsp;ultimately&nbsp;be&nbsp;evaluated by counsel.&nbsp;&nbsp;<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Consider the following \u201cfacts\u201d for the illustration of this example.&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>This matter involved a set of company data that had been created and stored within individual custodian profiles employed by a company based in Germany and the&nbsp;US.&nbsp;&nbsp;<\/li><li>Although the custodians granted access and permission to the data, there were still certain workflows and precautions taken to ensure that the data had been properly handled by the \u201cdata processor\u201d before it&nbsp;was&nbsp;ultimately&nbsp;accessed&nbsp;by the US legal team.&nbsp;&nbsp;<\/li><li>The data sets included: a set of email (thousands being S\/Mime encrypted), loose efiles (aka non-email documents), and data collected from a document management system.&nbsp;&nbsp;<\/li><li>The data was to be \u201cdecrypted\u201d,&nbsp;\u201cprocessed\u201d and \u201csearched\u201d in Europe and resulting data transferred to the client\u2019s European counsel for further handling according to the standard contractual clauses or binding corporate rules held by the firm.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-relationships-defined\"><strong>Relationships Defined<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When operating in Europe, one would be remiss not to take into consideration the many rules and regulations that help define data accessibility from one jurisdiction to the next. In 2018, the European General Data Protection Regulation or \u201cGDPR\u201d came into force helping to create some uniformity across member states. Enforcement may differ slightly between members of the European Union, but the underlying guidance is one that can be relied upon to help dictate the process of extracting information for use in legal or regulatory matters. It is important to understand the roles various parties play in ensuring data subject rights are not infringed upon.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the scenario presented here, data resided in Germany. The company at the center of the US based legal dispute had been charged with extracting information related to certain key individuals of interest for further investigation.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Data Controller<\/strong>: Under the GDPR, the company along with its external counsel are in the position of the \u201cdata controller\u201d, which can be defined as: <em>the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.<\/em><\/li><li><strong>Data Processor<\/strong>: iDS was placed in the position of the \u201cdata processor\u201d. Under the GDPR, this role can be broadly defined as <em>a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller<\/em>.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">As an experienced data processor, we were able to draw the attention back to legal counsel on issues related to data protection, ensuring that any instruction related to the processing of said data was in accordance with the regulation. While we do not provide legal advice, we know the law and as such must ensure that our own actions are properly accounted for from a data protection perspective. This required careful coordination and clear understanding, both of which were well covered by the parties involved.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cross-Border Transfer<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In this scenario, left with only one viable option and an aggressive deadline, the consulting team was able to pivot, using the law firm\u2019s own resources and existing transfer framework to effectuate the task at hand. This did not necessitate the lengthy process of formulating from scratch a detailed outline of the actions required (which could not be achieved under the agreed upon timeline). By positioning the law firm as the transferring party, iDS was able to focus on processing data and getting it into the hands of local resources, i.e. the offices of external counsel in Europe. With accessibility and transfer options understood it was time to focus on the nuts and bolts of getting the job done.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Nuts and Bolts<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The iDS team was able to \u2018stand up\u2019, within \u201cThe Cloud\u201d, an entire server operation in 72-hours, inclusive of a third-party data processing platform, within the AWS Frankfurt region.<a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/cross-border-esi-considerations-for-time-sensitive-data-handling#_ftn1\">[1]<\/a> To aid the solution, the team also leveraged an SFTP server within the AWS environment that is capable of talking directly to the processing platform, meaning data transferred by the company was already in the final staging area without the need to additionally move it in order to process and triage.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>The Cloud<\/em><\/strong> &#8211; Dispelling some of the illusions<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Picture1-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>This is \u2018the cloud\u2019<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Perception<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The primary perception among the risk averse is understandable; however, data is <em>not<\/em> floating around in an unsecured ether. Computer power and storage are simply leased to customers and the infrastructure powering this hardly differs from an in-house, bare metal server configuration. The term \u2018cloud\u2019 is great marketing but is equally difficult to navigate within data protection conversations owed to a lack of consensus and understanding.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Security by Design<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Physical Sites<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If customers are looking to rent secure data centre space in a given location, the selling point of those facilities are in touch with the concerns of the buyers \u2013building access, floods, earthquakes, tornadoes, wildfires. <a href=\"https:\/\/www.googleadservices.com\/pagead\/aclk?sa=L&amp;ai=DChcSEwj2n-f405fyAhUBrsgKHd7xCO4YABACGgJxdQ&amp;ohost=www.google.com&amp;cid=CAESQeD2Szf9fODZpYKQ2D_AoGtmOoj3-pG1he6ajanNu8ROElBkoudH2m6ew1NQ81Ulh2ZFyjDQ9vVobrkQTWudmlRw&amp;sig=AOD64_0NjHl4JD_YeG_H-1mVAmZ4rm5L9A&amp;q&amp;adurl&amp;ved=2ahUKEwjFqN3405fyAhVGSjABHdQbAXsQ0Qx6BAgFEAE\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon Web Services<\/a> (AWS) select their sites on the same criteria. Remember: they\u2019re protecting some of their own systems in these centres, not just the <a href=\"https:\/\/aws.amazon.com\/vpc\/?vpc-blogs.sort-by=item.additionalFields.createdDate&amp;vpc-blogs.sort-order=desc\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Private Cloud<\/a> (VPC) customers\u2019 environments. These sites are also fully-equipped with multi-factor entry for staff, airlock doors, CCTV \u2013the works.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Big Advantages<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Using EC2 Compute (AWS\u2019s virtual PC\u2019s) instead of bare-metal servers have many advantages. The more obvious benefits are time-to-operation and the ability to be further reaching geographically (mobility).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Cost<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If operations are cleverly monitored by consultants familiar with the framework, it can deliver some overt cost savings as well, as the resources are at-the-ready rather than fixed costs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Time<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In a recent engagement with over 400GB of mail data from a German client, the team was able to take in and subsequently process 80 \u2013 100GB of data per day in near real-time. This success is twofold; 1) the bandwidth conditions were favorable for both the Client and the iDS team such that the SFTP transfer (upload) of mail data was 4-5X faster than market averages<a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/cross-border-esi-considerations-for-time-sensitive-data-handling#_ftn2\">[2]<\/a>, and 2) the data processing platform was very easily unpacking, parsing and processing data for triage at speeds unseen in nearly every other platform using this same configuration. The iDS team was able to have documents loaded, culled, searched and produced within 24 hours of receiving the first large tranche.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Available Anywhere<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There have been a number of engagements where Clients insist that heavy, bare-metal equipment be taken on-site to a location in say, Austria or Germany. This will continue as certain companies and industries have strict perception concerns related to data leaving their own premises, let alone entering a server environment not controlled by their own team. This blog however demonstrates viable and acceptable alternative options.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For more information on how iDS can assist you with cross border issues, please contact any of the authors at <a href=\"mailto:jvaughn@idsinc.com\">jvaughn@idsinc.com<\/a>, <a href=\"mailto:tlatulippe@idsinc.com\">tlatulippe@idsinc.com<\/a> or <a href=\"mailto:drupprecht@idsinc.com\">drupprecht@idsinc.com<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/cross-border-esi-considerations-for-time-sensitive-data-handling#_ftnref1\"><em>[1]<\/em><\/a><em> Regionally specific data protection<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/cross-border-esi-considerations-for-time-sensitive-data-handling#_ftnref2\"><em>[2]<\/em><\/a><em> Based on industry knowledge and experience of uploads in the 500k \u2013 1MB range.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jim Vaughn, Tim LaTulippe, and Dan Rupprecht on 10\/18\/20 7:00 AM In today\u2019s&nbsp;ever-changing world of technology and legal requirements, data handling considerations have become of critical importance.&nbsp;&nbsp;There are&nbsp;multiple&nbsp;levels of consideration including legal obligations, privacy, and logistics.&nbsp;&nbsp;This is one example of how&nbsp;European&nbsp;based clients can carefully and strategically&nbsp;provide&nbsp;data for a US based&nbsp;dispute or litigation.&nbsp;<\/p>","protected":false},"author":7,"featured_media":2395,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cross Border ESI: Time Sensitive Data Handling - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/cross-border-esi-considerations-for-time-sensitive-data-handling\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cross Border ESI: Considerations for Time Sensitive Data Handling\" \/>\n<meta property=\"og:description\" content=\"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/cross-border-esi-considerations-for-time-sensitive-data-handling\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-18T21:40:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:12:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Cross Border ESI: Considerations for Time Sensitive Data Handling\",\"datePublished\":\"2020-10-18T21:40:33+00:00\",\"dateModified\":\"2021-11-30T20:12:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/\"},\"wordCount\":1319,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202015.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/\",\"name\":\"Cross Border ESI: Time Sensitive Data Handling - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202015.jpg\",\"datePublished\":\"2020-10-18T21:40:33+00:00\",\"dateModified\":\"2021-11-30T20:12:26+00:00\",\"description\":\"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202015.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202015.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/cross-border-esi-considerations-for-time-sensitive-data-handling\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cross Border ESI: Considerations for Time Sensitive Data Handling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cross Border ESI: Time Sensitive Data Handling - iDiscovery Solutions","description":"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/cross-border-esi-considerations-for-time-sensitive-data-handling\/","og_locale":"en_GB","og_type":"article","og_title":"Cross Border ESI: Considerations for Time Sensitive Data Handling","og_description":"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.","og_url":"https:\/\/idsinc.com\/en_gb\/cross-border-esi-considerations-for-time-sensitive-data-handling\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-10-18T21:40:33+00:00","article_modified_time":"2021-11-30T20:12:26+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Written by":"iDiscovery Solutions","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Cross Border ESI: Considerations for Time Sensitive Data Handling","datePublished":"2020-10-18T21:40:33+00:00","dateModified":"2021-11-30T20:12:26+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/"},"wordCount":1319,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/","url":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/","name":"Cross Border ESI: Time Sensitive Data Handling - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg","datePublished":"2020-10-18T21:40:33+00:00","dateModified":"2021-11-30T20:12:26+00:00","description":"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer.","breadcrumb":{"@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202015.jpg","width":2500,"height":1250,"caption":"Cross Border ESI: Considerations for Time Sensitive Data Handling. Finding the right Data Processing Platform for Cross-Border Transfer."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/cross-border-esi-considerations-for-time-sensitive-data-handling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cross Border ESI: Considerations for Time Sensitive Data Handling"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery Solutions","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/en_gb\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2395"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}