. . . "\u96FB\u5B50\uFF08\u7684\uFF09\u60C5\u5831\u958B\u793A\uFF08\u3067\u3093\u3057\uFF08\u3066\u304D\uFF09\u3058\u3087\u3046\u307B\u3046\u304B\u3044\u3058\uFF09\u3001\u96FB\u5B50\uFF08\u7684\uFF09\u8A3C\u62E0\u958B\u793A\uFF08\u3067\u3093\u3057\uFF08\u3066\u304D\uFF09\u3057\u3087\u3046\u3053\u304B\u3044\u3058\uFF09\u3001\u3042\u308B\u3044\u306Fe\u30C7\u30A3\u30B9\u30AB\u30D0\u30EA\uFF08\u30FC\uFF09\uFF08Electronic discovery\u3001e-discovery\uFF09\u306F\u3001\u6C11\u4E8B\u8A34\u8A1F\u306B\u304A\u3051\u308B\u958B\u793A\u624B\u7D9A\uFF08discovery\uFF09\u3067\u3042\u3063\u3066\u3001\u96FB\u5B50\u7684\u306B\u4FDD\u5B58\u3055\u308C\u3066\u3044\u308B\u60C5\u5831\u306B\u95A2\u3059\u308B\u3082\u306E\u3092\u6307\u3059\u3002\u3053\u3053\u3067\u96FB\u5B50\u7684\u306B\u4FDD\u5B58\u3055\u308C\u3066\u3044\u308B\u3068\u306F\u3001\u60C5\u5831\u304C\u96FB\u5B50\u7684\u306A\u5A92\u4F53\uFF08\u78C1\u6C17\u30C7\u30A3\u30B9\u30AF\u3001\u5149\u30C7\u30A3\u30B9\u30AF\u306A\u3069\uFF09\u306B\u8A18\u9332\u3055\u308C\u3066\u3044\u308B\u3068\u3044\u3046\u610F\u5473\u3067\u3042\u308B\u3002"@ja . "\uC804\uC790 \uB514\uC2A4\uCEE4\uBC84\uB9AC \uD639\uC740 e-\uB514\uC2A4\uCEE4\uBC84\uB9AC \uD639\uC740 \uC804\uC790\uC801 \uC99D\uAC70\uAC1C\uC2DC(Electronic discovery, e-discovery)\uB294 \uBBFC\uC0AC\uC18C\uC1A1\uC5D0\uC11C \uC2E4\uC2DC\uD558\uB294 \uC804\uC790\uC801\uC73C\uB85C \uC800\uC7A5\uB418\uC5B4\uC788\uB294 \uC815\uBCF4\uB97C \uAC1C\uC2DC\uD558\uB294 \uAC83\uC744 \uB9D0\uD55C\uB2E4. \uC5EC\uAE30\uC5D0 \uC804\uC790\uC801\uC73C\uB85C \uC800\uC7A5\uB418\uC5B4 \uC788\uB294 \uC815\uBCF4\uB780 \uC804\uC790\uC801\uC778 \uB9E4\uCCB4(PC\uC758 \uB0B4\uC6A9\uBFD0\uB9CC \uC544\uB2C8\uB77C \uC11C\uBC84\uB098 \uD734\uB300\uC804\uD654, PDA, \uD734\uB300 \uC815\uBCF4\uB2E8\uB9D0\uAE30, USB \uBA54\uBAA8\uB9AC \uB4F1\uC744 \uD65C\uC6A9\uD55C \uC678\uBD80\uAE30\uC5B5\uC7A5\uCE58, \uBBA4\uC9C1 \uD50C\uB808\uC774\uC5B4, \uD074\uB77C\uC6B0\uB4DC \uC2DC\uC2A4\uD15C \uB4F1)\uC5D0 \uAE30\uB85D\uB418\uC5B4 \uC788\uB2E4\uB294 \uC758\uBBF8\uC774\uB2E4."@ko . . "Electronic discovery"@pl . . . . . . "Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often referred to as electronically stored information or ESI). Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Electronic information is usually accompanied by metadata that is not found in paper documents and that can play an important part as evidence (e.g. the date and time a document was written could be useful in a copyright case). The preservation of metadata from electronic documents creates special challenges to prevent spoliation. In the United States, at the federal level, electronic discovery is governed by common law, case law and specific statutes, but primarily by the Federal Rules of Civil Procedure (FRCP), including amendments effective December 1, 2006, and December 1, 2015. In addition, state law and regulatory agencies increasingly also address issues relating to electronic discovery. In England and Wales, Part 31 of the Civil Procedure Rules and Practice Direction 31B on Disclosure of Electronic Documents apply. Other jurisdictions around the world also have rules relating to electronic discovery."@en . . . . . . "Mittels eDiscovery (auch E-Discovery oder e-discovery) werden in Unternehmen f\u00FCr einen bestimmten Sachverhalt relevante Daten (meist E-Mails und Dokumente) identifiziert, aufbereitet und bereitgestellt bzw. an Dritte \u00FCbergeben. Der Begriff kommt urspr\u00FCnglich aus dem angloamerikanischen Rechtsraum und bezeichnet dort den Teil eines Discovery, der elektronische Unterlagen, wie beispielsweise E-Akten, E-Mails oder Chat-Protokollen betrifft. Mittels eines eDiscovery-Prozesses soll dabei die Vollst\u00E4ndigkeit der Daten sichergestellt und gleichzeitig die Gefahr, Gesch\u00E4ftsgeheimnisse zu verlieren, minimiert werden. Der Prozess wird in der Regel durch eine Software unterst\u00FCtzt bzw. durch diese teilautomatisiert. Neben diesem Einsatz, werden eDiscovery-Prozesse und -Software bei der Analyse von unstrukturierten Massendaten in und au\u00DFerhalb von Unternehmen eingesetzt. Beispielsweise setzte die S\u00FCddeutsche Zeitung zusammen mit dem Internationales Netzwerk investigativer Journalisten f\u00FCr die Aufbereitung der Panama Papers die eDisovery-Software Nuix ein und vom Internationalen Strafgerichtshof f\u00FCr das ehemalige Jugoslawien der Vereinten Nationen wurde die eDisovery-Software ZyLAB verwendet."@de . . . . . . . . . . . . . . . "1123043422"^^ . . . . "Rozpoznawanie dowod\u00F3w elektronicznych, odkrywanie elektroniczne (z ang. electronic discovery, skr. e-discovery, ediscovery lub eDiscovery) to pochodz\u0105cy z ameryka\u0144skiego systemu prawnego proces przygotowawczy prowadzony w ramach , kt\u00F3re dotyczy\u0107 mo\u017Ce cywilnych spor\u00F3w s\u0105dowych, \u015Bledztw prowadzonych z urz\u0119du, post\u0119powa\u0144 wewn\u0119trznych czy \u017C\u0105da\u0144 udost\u0119pnienia informacji publicznej. W odkrywaniu elektronicznym mamy do czynienia z gromadzeniem, opracowywaniem i prezentowaniem dowod\u00F3w elektronicznych, czyli \u015Brodk\u00F3w dowodowych, kt\u00F3re bazuj\u0105 na informacji przechowywanej elektronicznie."@pl . "Rozpoznawanie dowod\u00F3w elektronicznych, odkrywanie elektroniczne (z ang. electronic discovery, skr. e-discovery, ediscovery lub eDiscovery) to pochodz\u0105cy z ameryka\u0144skiego systemu prawnego proces przygotowawczy prowadzony w ramach , kt\u00F3re dotyczy\u0107 mo\u017Ce cywilnych spor\u00F3w s\u0105dowych, \u015Bledztw prowadzonych z urz\u0119du, post\u0119powa\u0144 wewn\u0119trznych czy \u017C\u0105da\u0144 udost\u0119pnienia informacji publicznej. W odkrywaniu elektronicznym mamy do czynienia z gromadzeniem, opracowywaniem i prezentowaniem dowod\u00F3w elektronicznych, czyli \u015Brodk\u00F3w dowodowych, kt\u00F3re bazuj\u0105 na informacji przechowywanej elektronicznie. Sposoby obchodzenia si\u0119 z potencjalnymi dowodami w ramach eDiscovery s\u0105 \u2013 w zale\u017Cno\u015Bci od kontekstu \u2013 regulowane zasadami zale\u017Cnymi od wymog\u00F3w ustawowych b\u0105d\u017A innymi uzgodnionymi wytycznymi. Mog\u0105 to by\u0107 np. wewn\u0119trzne procedury organizacji czy regu\u0142y post\u0119powa\u0144 cywilnych. Przed przekazaniem danych do wnioskuj\u0105cego dochodzi zazwyczaj do ich przegl\u0105du w celu wy\u0142onienia informacji istotnych ze wzgl\u0119du na interes stron czy wy\u0142\u0105czenia dokument\u00F3w obj\u0119tych przywilejem (np. w zwi\u0105zku z tajemnic\u0105 adwokack\u0105, ochron\u0105 danych osobowych, tajemnic\u0105 przedsi\u0119biorstwa b\u0105d\u017A prawem \u015Bwiadka do odmowy sk\u0142adania obci\u0105\u017Caj\u0105cych go zezna\u0144). Informacja w postaci elektronicznej r\u00F3\u017Cni si\u0119 od informacji przekazywanej z u\u017Cyciem dokumentu w postaci papierowej tym, \u017Ce jej forma jest niezwi\u0105zana z konkretnym medium. W rezultacie danych poddawanych przetwarzaniu mo\u017Ce by\u0107 znacznie wi\u0119cej (brak ograniczenia wolumenu fizyczn\u0105 przestrzeni\u0105), mog\u0105 by\u0107 one ulotne (\u0142atwiej o przypadkowe lub celowe zniszczenie b\u0105d\u017A skasowanie), a jednocze\u015Bnie \u0142atwiejsze w ukrywaniu czy magazynowaniu (niski koszt wykonania i przes\u0142ania kopii). Elektronicznie zapisanym informacjom towarzysz\u0105 zazwyczaj metadane, kt\u00F3re rzadko towarzysz\u0105 konwencjonalnym dokumentom (np. w postaci metryczek, tabel informacyjnych, tabel rewizji, informacji wydawniczych itp.). Odgrywaj\u0105 one istotn\u0105 rol\u0119 i w pewnych okoliczno\u015Bciach same mog\u0105 by\u0107 odpowiednim \u015Brodkiem dowodowym. Na przyk\u0142ad data i czas powstania b\u0105d\u017A przes\u0142ania dokumentu mog\u0105 by\u0107 istotne w sprawach dotycz\u0105cych prawa autorskiego czy praw w\u0142asno\u015Bci intelektualnej."@pl . . . . . . "Mittels eDiscovery (auch E-Discovery oder e-discovery) werden in Unternehmen f\u00FCr einen bestimmten Sachverhalt relevante Daten (meist E-Mails und Dokumente) identifiziert, aufbereitet und bereitgestellt bzw. an Dritte \u00FCbergeben."@de . . . . "\u96FB\u5B50\uFF08\u7684\uFF09\u60C5\u5831\u958B\u793A\uFF08\u3067\u3093\u3057\uFF08\u3066\u304D\uFF09\u3058\u3087\u3046\u307B\u3046\u304B\u3044\u3058\uFF09\u3001\u96FB\u5B50\uFF08\u7684\uFF09\u8A3C\u62E0\u958B\u793A\uFF08\u3067\u3093\u3057\uFF08\u3066\u304D\uFF09\u3057\u3087\u3046\u3053\u304B\u3044\u3058\uFF09\u3001\u3042\u308B\u3044\u306Fe\u30C7\u30A3\u30B9\u30AB\u30D0\u30EA\uFF08\u30FC\uFF09\uFF08Electronic discovery\u3001e-discovery\uFF09\u306F\u3001\u6C11\u4E8B\u8A34\u8A1F\u306B\u304A\u3051\u308B\u958B\u793A\u624B\u7D9A\uFF08discovery\uFF09\u3067\u3042\u3063\u3066\u3001\u96FB\u5B50\u7684\u306B\u4FDD\u5B58\u3055\u308C\u3066\u3044\u308B\u60C5\u5831\u306B\u95A2\u3059\u308B\u3082\u306E\u3092\u6307\u3059\u3002\u3053\u3053\u3067\u96FB\u5B50\u7684\u306B\u4FDD\u5B58\u3055\u308C\u3066\u3044\u308B\u3068\u306F\u3001\u60C5\u5831\u304C\u96FB\u5B50\u7684\u306A\u5A92\u4F53\uFF08\u78C1\u6C17\u30C7\u30A3\u30B9\u30AF\u3001\u5149\u30C7\u30A3\u30B9\u30AF\u306A\u3069\uFF09\u306B\u8A18\u9332\u3055\u308C\u3066\u3044\u308B\u3068\u3044\u3046\u610F\u5473\u3067\u3042\u308B\u3002"@ja . . . "Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often referred to as electronically stored information or ESI). Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party."@en . . . . . . . "EDiscovery"@de . . . . . . "Electronic discovery, tamb\u00E9m conhecida como e-discovery, refere-se a qualquer m\u00E9todo de busca, pesquisa, localiza\u00E7\u00E3o e obten\u00E7\u00E3o de dados e informa\u00E7\u00F5es eletr\u00F4nicos com a inten\u00E7\u00E3o de utiliz\u00E1-los como evid\u00EAncias, em um processo judicial. Nos Estados Unidos, o assunto foi objeto de uma lei espec\u00EDfica (E-Discovery Law), promulgada em 2006. Pode ser executada off-line em um \u00FAnico computador ou em uma rede de computadores, podendo requerer uma ordem judicial para acesso, visando a obten\u00E7\u00E3o de provas essenciais. Podem incluir textos, imagens, banco de dados, planilhas eletr\u00F4nicas, arquivos de \u00E1udio, anima\u00E7\u00F5es, web sites e programas de computador. Mesmo malwares (do ingl\u00EAs malicious software), trojans e spywares podem ser obtidos e investigados. O e-mail pode ser sobretudo uma valiosa fonte de provas em processos judiciais. A computa\u00E7\u00E3o forense (em ingl\u00EAs, Cyber Forensics) \u00E9 uma forma especializada de e-discovery em que \u00E9 executada uma investiga\u00E7\u00E3o sobre o conte\u00FAdo do disco r\u00EDgido de um computador. Ap\u00F3s isolar fisicamente o computador, os investigadores fazem uma c\u00F3pia digital da unidade de disco r\u00EDgido. Em seguida, o computador original \u00E9 bloqueado numa instala\u00E7\u00E3o segura, para manter a sua condi\u00E7\u00E3o original. Toda a investiga\u00E7\u00E3o \u00E9 feita sobre a c\u00F3pia digital. Mesmo nos Estados Unidos, e-discovery \u00E9 uma \u00E1rea ainda em consolida\u00E7\u00E3o. Por suas implica\u00E7\u00F5es, que v\u00E3o muito al\u00E9m de aspectos meramente tecnol\u00F3gicos, suscita quest\u00F5es de ordem jur\u00EDdica, pol\u00EDtica, de seguran\u00E7a e de privacidade, que ainda n\u00E3o foram resolvidas."@pt . . . . . "\u96FB\u5B50\u60C5\u5831\u958B\u793A"@ja . . . . . . . . . . . . . . . . "5909339"^^ . . . . . . . . "\uC804\uC790 \uB514\uC2A4\uCEE4\uBC84\uB9AC"@ko . "\uC804\uC790 \uB514\uC2A4\uCEE4\uBC84\uB9AC \uD639\uC740 e-\uB514\uC2A4\uCEE4\uBC84\uB9AC \uD639\uC740 \uC804\uC790\uC801 \uC99D\uAC70\uAC1C\uC2DC(Electronic discovery, e-discovery)\uB294 \uBBFC\uC0AC\uC18C\uC1A1\uC5D0\uC11C \uC2E4\uC2DC\uD558\uB294 \uC804\uC790\uC801\uC73C\uB85C \uC800\uC7A5\uB418\uC5B4\uC788\uB294 \uC815\uBCF4\uB97C \uAC1C\uC2DC\uD558\uB294 \uAC83\uC744 \uB9D0\uD55C\uB2E4. \uC5EC\uAE30\uC5D0 \uC804\uC790\uC801\uC73C\uB85C \uC800\uC7A5\uB418\uC5B4 \uC788\uB294 \uC815\uBCF4\uB780 \uC804\uC790\uC801\uC778 \uB9E4\uCCB4(PC\uC758 \uB0B4\uC6A9\uBFD0\uB9CC \uC544\uB2C8\uB77C \uC11C\uBC84\uB098 \uD734\uB300\uC804\uD654, PDA, \uD734\uB300 \uC815\uBCF4\uB2E8\uB9D0\uAE30, USB \uBA54\uBAA8\uB9AC \uB4F1\uC744 \uD65C\uC6A9\uD55C \uC678\uBD80\uAE30\uC5B5\uC7A5\uCE58, \uBBA4\uC9C1 \uD50C\uB808\uC774\uC5B4, \uD074\uB77C\uC6B0\uB4DC \uC2DC\uC2A4\uD15C \uB4F1)\uC5D0 \uAE30\uB85D\uB418\uC5B4 \uC788\uB2E4\uB294 \uC758\uBBF8\uC774\uB2E4."@ko . . "Electronic discovery"@en . "Electronic discovery"@pt . "Electronic discovery, tamb\u00E9m conhecida como e-discovery, refere-se a qualquer m\u00E9todo de busca, pesquisa, localiza\u00E7\u00E3o e obten\u00E7\u00E3o de dados e informa\u00E7\u00F5es eletr\u00F4nicos com a inten\u00E7\u00E3o de utiliz\u00E1-los como evid\u00EAncias, em um processo judicial. Nos Estados Unidos, o assunto foi objeto de uma lei espec\u00EDfica (E-Discovery Law), promulgada em 2006. Pode ser executada off-line em um \u00FAnico computador ou em uma rede de computadores, podendo requerer uma ordem judicial para acesso, visando a obten\u00E7\u00E3o de provas essenciais. Podem incluir textos, imagens, banco de dados, planilhas eletr\u00F4nicas, arquivos de \u00E1udio, anima\u00E7\u00F5es, web sites e programas de computador."@pt . . . "26711"^^ . . . . . . .