Information Governance

News & Analysis as of

I’ve Made a Huge Mistake: Intentional Destruction of ESI is No Illusion

In season three of the series Arrested Development, episode 11 finds George Bluth, Sr. unsurprisingly using a giant electromagnet in an attempt to delete electronic computer files, which could potentially indict him for...more

Employment Law Reporter - May 2016

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

Data security is top driver for information governance

A recent Advice from Counsel study sponsored by FTI Technology, entitled “The State of Information Governance in Corporations” found data security to be the top driver for information governance initiatives. The purpose of...more

Friday Funnies: Exterro's E-Discovery and IG Comics and Memes Page

We here at Exterro love E-Discovery! But it helps to have a sense of humor. That's why we created our E-Discovery and Information Governance Memes and Cartoons Series. And now you can go back and relive the magic...more

[Webinar] Working with IT / Legal Effectively - April 27th, 1:00pm ET / 10:00am PT

IT says tomato, Legal says tomahto. Legal reads Latin, IT writes Javascript. Whatever analogy you want to use, Legal and IT speak different languages that often presents challenges communicating and working effectively...more

Developing information governance efforts

In an information governance model, there are business-focused components and aspects, and there are technology-focused components and aspects. Information Governance isn’t just technology driven, nor is it solely business...more

Data Hoarders: 5 Tips for Managing Large Volumes of Corporate Data Without Sacrificing Defensibility

We've all seen (or at least heard of) the TV show Hoarders. We may even have a few candidates for an episode in our own social circles. I once worked a summer helping clean up a pig farm turned junkyard, and in the first wave...more

Data Valuation – Worth Zero or Trillions?

Almost every entity is, or is becoming, a digital enterprise. Today’s information economy mandates nothing less. Entities are making tremendous investments in order to exploit the vast amounts of data – Big Data – that are...more

Where are the File Cabinets? -- The Changing Face of Data in the 21st Century

When we think of electronic data files, of course we know they aren’t stored in tall metal cabinets with manila cards on the drawer faces denoting what’s inside. That’s so 1986. But even for those of us firmly grounded in...more

Ransomware Attack Highlights Importance of Preparation

Hollywood Presbyterian Medical Center in Los Angeles recently paid a $17,000 ransom in bitcoins to a malware hacker who seized control of the hospital's computer systems and demanded money ransom as a condition to returning...more

LegalTech New York 2016 Report

LegalTech New York 2016 took place in early February. Several Morris James attorneys and members of IT attended the event. As usual, the event attracted some of the best legal technology minds in the country....more

Trends, Challenges, Tech: E-Discovery Enters a New Era

E-Discovery is no longer in its infancy. A decade has passed since the 2006 FRCP amendment that made ESI discoverable, and in that time legal teams have been working out how best to successfully accomplish this process. ...more

#LTNY16: That’s a Wrap!

Whew! After three electrifying (and tiring) days, Legal Tech New York 2016 is in the books! For those of you that experienced the show first-hand, we don’t have to tell you that this year’s conference was another...more

The Life-Changing Magic of Information Governance: Cutting Costs and Mitigating Risk with IG

The New Year brings fresh starts, and most of us, after a season of giving and receiving, parties and celebrations, are feeling the need to take stock and streamline our lives. In the bestselling book, The Life-Changing...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

Our 2016 Resolutions for eDiscovery, Part 2

Last week, we discussed four eDiscovery resolutions that counsel should make as they kick off 2016. In this blog, we offer four more pearls of wisdom for counsel to consider as they tackle the New Year....more

Do Cyber Insurers Care about Information Governance?

As we welcome in 2016, awareness of the variety of information-related risks confronting today’s enterprises, and the availability of insurance covering those risks, is at an all-time high. High-profile data breaches caused...more

EBA consults on guidelines on ICAAP and ILAAP information

EBA is consulting on draft guidelines on the collection of information related to the internal capital adequacy assessment process (ICAAP) and the internal liquidity adequacy assessment process (ILAAP), which form part of the...more

Untrusted Advisor: How Your Law Firm May Fail to Protect Your Data

In recent years, the prevalence of data and information security breaches at major corporations have become increasingly more commonplace. While general awareness may be increasing, many companies are still neglecting to...more

A Veritable Feast: E-Discovery Tools and Resources for the Holiday Season

Thanksgiving is a time of reflection, for looking back on the challenges of the previous year and recognizing all those who supported us through them. It’s also a time of preparedness. Yes, most people see Thanksgiving as the...more

Recognizing the Role and Importance of the CISO

In July of this year, we reported on the Cybersecurity Assessment Tool published by the Federal Financial Institutions Examination Council. The FFIEC is an interagency organization that establishes the examination standards...more

It’s Called Sputnik!: Don’t Fall Behind in the E-Discovery Space Race

This week marks the 58th anniversary since the launch of Sputnik II, the first spacecraft in history to carry a living animal—a dog named Laika—into Earth orbit. But the Sputnik program, which began the space age in 1957,...more

SEC Cybersecurity Update

Results from the SEC’s First Round of Cybersecurity Examinations - On February 3, 2015, the OCIE published a risk alert summarizing its findings from its examinations of over 100 registered investment advisers and...more

SEC Announces Second Wave of Cyber Exams of Broker Dealers and Advisors – Is Your Firm Ready?

In April 2014, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) issued a Risk Alert announcing its first cybersecurity sweep initiative. Pursuant to that initiative,...more

Unmasking Information Governance: What is it and how do I move it forward in my organization?

The heightened state of information security in recent years has instigated genuine collaboration, in many organizations, amongst its professionals in IT, records, security, risk, compliance, and other stakeholders in...more

49 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×