CPC G06F 21/6245 (2013.01) [G06F 11/1451 (2013.01); G06F 11/1464 (2013.01); G06F 11/1469 (2013.01); G06F 21/602 (2013.01); G06F 21/604 (2013.01); G06Q 50/18 (2013.01); H04L 67/568 (2022.05); G06Q 2220/00 (2013.01)] | 18 Claims |
1. A computer implemented method for use with an enterprise computer system including a set of primary copies of data of the enterprise and a set of backup copies of data of the enterprise, the computer implemented method comprising:
receiving, at an independent backup copy computer, information indicative of an identity of legal hold data, which is enterprise data that has been subject to a legal hold request, and where the information includes a plurality of search criteria, the independent backup copy computer being separate and independent from a primary copy sub-system containing the set of primary copies of the data of the enterprise in a primary copy data store;
determining, by the independent backup copy computer, the legal hold data from the set of backup copies stored on an external backup server in an external data store and accessed by the independent backup copy computer, where the legal hold data is data corresponding to one or more of the plurality of search criteria, the external data store containing the set of backup copies being separate from the primary copy data store, and wherein the independent backup copy computer disables ability of the data to expire;
processing the set of primary copies of data into a human-readable format, wherein the processing includes concatenating the set of primary copies of data and making the set of primary copies of data available to a limited set of recipients;
copying and storing the set of primary copies in the primary data store prior to entering a legal hold data order which orders a legal hold on the primary data responsive to a predetermined search criteria;
copying and encrypting by the independent backup copy computer, the legal hold data from the set of backup copies collectively into a plurality of cloud data storage units suitable for temporary storage in a cloud computer system, the independent backup copy computer being part of the enterprise computer system and independent from the cloud computer system;
performing an on-demand packaging of the legal hold data from an encrypted storage bucket to an encrypted concatenated file and automatically generating a secured one-time access link;
monitoring access to the on-demand packaging and deleting the encrypted concatenated file once the on-demand packaging has been accessed; and
forwarding, by the independent backup copy computer, the plurality of cloud data storage units to the cloud computer system for storing in one or more containers, where the copied, encrypted legal hold data is retained for the duration of the legal hold request.
|