Demand Data has released a new addition to the Connected Backup PC software suite from its principal, Iron Mountain Digital. Dubbed Classify & Collect, it is designed to search data in enterprise computers – in virtually any file including email – gather it into a central, server-based search engine-type database and classify it for eDiscovery purposes.

The package is fully compliant with the objectives of South Africa’s Protection of Personal Information Act which include giving effect to the constitutional right to privacy by safeguarding personal information.
According to Demand Data’s technical director, John Hope-Bailie, Classify & Collect can be configured to recognise particular patterns of digits and characters such as credit card, ID and passport numbers.  
He says this type of information is under increasing scrutiny from various governance, risk and compliance (GRC) frameworks in South Africa.
“Without effective management of their information and other resources, enterprises often waste considerable time and money satisfying discovery demands. They need solutions that give them control over both the risks and the costs associated with information management and eDiscovery,” stresses Hope-Bailie.
He says Classify & Collect was developed to allow users to be prepared for possible investigation by making data stored on enterprise PCs and laptops easily searchable and discoverable. “It also allows forensic investigators to undertake searches for any and all types of content on corporate PCs, including so-called ‘edge PCs’ often used by mobile executives and not always linked to the corporate network.”
Hope-Bailie says it is vital to first include an audit to understand the corporate data mix and possible risk exposure when planning to implement policy linked to GRC frameworks.
“This is a key requirement to which Classify & Collect’ responds by automatically and non-intrusively collecting metadata for possible future review.
“However, as the act stipulates, privacy is subject to justifiable limitations that are aimed at balancing this right against other rights, particularly the right of access to information and the free flow of information.”