• Subscribe
  • Sponsorship Opportunities
  • About Us
    • Contact Us
    • Who We Are
    • Why DATAVERSITY
    • Press
    • Request Media Kit
Search
Dataversity
  • Events
    • Upcoming Conferences
    • Upcoming Webinars
    • Upcoming Digital Events
    • Past Conferences
  • Training Center
  • Certification
    • ADG Certification
    • CDMP Certification
  • Women in Data
  • Resources Hub
  • Subscribe
  • Sponsorship Opportunities
  • About Us
    • Who We Are
    • Why Dataversity
    • Contact Us
    • Press
    • Request Media Kit
  • Course Catalog
  • ADGP Certification
  • CDMP Training
  • Upcoming Events
Close Window
Resources > Articles
Article icon
Article

Metadata… What is it? Why and How Do We Preserve It?

Shaun Stockman Published: September 9, 2013

What is Metadata?

Do a search on “Metadata” on the internet and the most common definition you may find is “Metadata: The data of data.” This is true, but what makes up this “data” of data?  Think of the title of your car. From the title of your car you can find out the make, model, owner, year.  This is your car’s “metadata.”

Now, let’s look at the metadata of a Microsoft Word document.  The metadata in a Microsoft Word document is more commonly known as the document’s “properties.”  Document properties should not be confused with the program’s properties, where a user can change the settings of the application. A document’s properties lists its metadata.  Some examples of metadata in a Microsoft Word document are your name/initials, your organization’s name, file type, document versions, file location, create date, last modified date, editing time, number of pages and total size of the document.  This information stays with the document and is used by your computer and other software as a reference guide.

For another perspective, let’s look at the metadata from a 2010 Microsoft Exchange e-mail message. I’m sure by now you could point out some of the obvious types of e-mail metadata: who the message was from, who the message was originally sent to, the date, subject and body, but there’s more! The Exchange server, the originating IP address and the message ID are just a few more examples of what important metadata is attached to an e-mail. Altogether there are 26 different types of metadata attached to one e-mail message. To see them all visit http://msdn.microsoft.com/en-us/library/Microsoft.Exchange.Data.Transport.Email.EmailMessage_properties(v=exchg.140).aspx

Why do we preserve Metadata?

First, what is metadata preservation? Metadata preservation is the ability to save and export the contents and metadata of a document or piece of data. This task has gained focus in recent years due to electronic communication becoming so vast. According to a report by The Radicati Group, the number of worldwide e-mail accounts is expected to hit 4.1 billion by 2015. (Radicati & Hoang, 2011) Of the entire world’s e-mail population, the corporate e-mail population makes up 25 percent.  That’s over 1 billion accounts by 2015!

Just like the information from the title of your car, metadata from electronic data can be changed or altered. E-mails and other data are evidence in legal cases. And, with all the e-mail and corresponding metadata to collect, legal teams and IT departments scramble to do so without disturbing or altering the crucial metadata needed to prove the legitimacy of the data.

How do we Preserve Metadata?

If Legal came to you for a copy of a Word document, how would you go about saving it so that the metadata would be properly preserved? Using just a Windows OS to copy and save a file would not be a sufficient way to preserve the metadata. When copying a file using Windows, the create date or “Time Stamp” of the copied file will change to the current date, thus altering the file’s metadata. There are software tools that will safely collect this type of data without disturbing the metadata.

What about the e-mail messages that Legal is asking for? There are tools available that maintain data integrity by performing read-only operations on the source files throughout the collection process – no editing functionality, just the ability to browse, search, preview, and export.

According to Michele Lange, Director of Thought Leadership, Kroll Ontrack, “While the term metadata is not explicitly included in the Federal Rules of Civil Procedure, metadata is clearly included within the definition of ‘electronically stored information,’ and therefore must be preserved and produced in the context of civil litigation. This information is critical to searching, organizing, and authenticating volumes of digital information during review and production. Based on an established body of ediscovery caselaw, failure to handle metadata in the same manner of the text of a document or email will result in sanctions.”

References

Radicati, D. S., & Hoang, Q. (2011). Email Statisics report. Retrieved August 1st, 2013, from Radicati: http://www.radicati.com/wp/wp-content/uploads/2011/05/Email-Statistics-Report-2011-2015-Executive-Summary.pdf

About the author

Shaun Stockman

Shaun Stockman, Technical Support Manager, Knoll Ontrack

As technical support manager for the data and storage technologies business line at Kroll Ontrack, Mr. Stockman oversees the technical support of Kroll Ontrack software solutions, including Ontrack EasyRecovery, Ontrack PowerControls and Ontrack Eraser. His team of expert technicians works directly with clients to provide professional and responsive resolution for both home user and enterprise-level technical issues.

Mr. Stockman holds more than 10 years of technical support and IT desktop experience for organizations such as ADC Inc., Lifetouch, and Marco Business Products. He has a wide range of practical and technical knowledge spanning standard industry storage devices, and he holds specific experience developing and leveraging reporting and analytics tools to measure success.

He has a Bachelor of Science degree in IT management from Concordia University and an Associate’s degree in microcomputer tech support/network administration from St. Cloud Technical College.

Learn More
Shaun Stockman
Share this Resource

Related Articles

Building a Practical Framework for AI Governance Maturity in the Enterprise

Read

What Is Active Metadata and Why Does It Matter?

Read

Cryptographic Data Sovereignty for LLM Training: Personal Privacy Vaults

Read
See More Articles

Lead the Data Revolution from Your Inbox.

Never miss a beat with updates on our conferences, certifications, webinars, and newest resources.

Form loading…

Thanks!

The form has been submitted.

Dataversity

Connect with us

  • LinkedIn
  • Facebook
  • YouTube
  • Intagram

Events

  • Upcoming Conferences
  • Upcoming Webinars
  • Digital Events
  • Past Conferences

Certification

  • Applied Data Governance Practitioner Certification
  • CDMP Certification
  • Training

Training Center

  • Live Online Training
  • Course Catalog
  • Subscription

Sponsorship Opportunities

Women in Data Management & Governance

Resource Hub

  • Articles
  • Case Studies
  • White Papers
  • Webinars
  • Podcasts
  • Product Demos
  • Data Concepts

About Us

  • Why Train with DATAVERSITY
  • Who We Are
  • Press Room
  • Contact Us
  • Request a Media Kit
  • Subscribe
  • Manage Email Preferences
© Dataversity. All Rights Reserved.
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Do Not Sell My Personal Information