Information Governance

News & Analysis as of

Electronic Discovery Preparedness Audit Handbook

While your organization may not regularly be involved in costly or complicated litigation, there are instances in which it may nonetheless be required to identify, collect, and produce documents most likely in the form of...more

Electronic Discovery Preparedness Checklist

While your organization may not regularly be involved in costly or complicated litigation, there is always the potential for this to arise. Additionally, you may work in an industry that is heavily regulated and subject to...more

Another Challenge for Information Governance: The Defense of Trade Secrets Act

Good information governance requires not only protecting the security of sensitive and proprietary information; it often requires pursuing legal action against those who threaten the secrecy and value of a company’s trade...more

I am not a Crook: Avoiding the Politics of Data Preservation with a Defensible E-Discovery Process

Of course we've all heard about Hillary's emails, and Trump certainly has email trouble of his own. For a while, Politwoops kept track of mistweets and other online regrets even after they were deleted until Twitter (and...more

Wave of the Future: Or, How I Learned to Streamline the E-Discovery Process from Howard Hughes

In 1935, Howard Hughes built and flew his revolutionary H-1 Racer. At that time, most of the United States’ military aircraft (such as the Curtiss P-6 Hawk) still used the same designs from the previous decade: biplanes with...more

Spreadsheets No More: Technology and the Expanding Role of Paralegals in E-Discovery

The role of the paralegal started in the 1960's in an attempt to streamline the delivery and cost efficiency of legal services. Today, that goal remains, especially in the field of E-Discovery. As companies increasingly look...more

I’ve Made a Huge Mistake: Intentional Destruction of ESI is No Illusion

In season three of the series Arrested Development, episode 11 finds George Bluth, Sr. unsurprisingly using a giant electromagnet in an attempt to delete electronic computer files, which could potentially indict him for...more

Employment Law Reporter - May 2016

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

Data security is top driver for information governance

A recent Advice from Counsel study sponsored by FTI Technology, entitled “The State of Information Governance in Corporations” found data security to be the top driver for information governance initiatives. The purpose of...more

Friday Funnies: Exterro's E-Discovery and IG Comics and Memes Page

We here at Exterro love E-Discovery! But it helps to have a sense of humor. That's why we created our E-Discovery and Information Governance Memes and Cartoons Series. And now you can go back and relive the magic...more

[Webinar] Working with IT / Legal Effectively - April 27th, 1:00pm ET / 10:00am PT

IT says tomato, Legal says tomahto. Legal reads Latin, IT writes Javascript. Whatever analogy you want to use, Legal and IT speak different languages that often presents challenges communicating and working effectively...more

Developing information governance efforts

In an information governance model, there are business-focused components and aspects, and there are technology-focused components and aspects. Information Governance isn’t just technology driven, nor is it solely business...more

Data Hoarders: 5 Tips for Managing Large Volumes of Corporate Data Without Sacrificing Defensibility

We've all seen (or at least heard of) the TV show Hoarders. We may even have a few candidates for an episode in our own social circles. I once worked a summer helping clean up a pig farm turned junkyard, and in the first wave...more

Data Valuation – Worth Zero or Trillions?

Almost every entity is, or is becoming, a digital enterprise. Today’s information economy mandates nothing less. Entities are making tremendous investments in order to exploit the vast amounts of data – Big Data – that are...more

Where are the File Cabinets? -- The Changing Face of Data in the 21st Century

When we think of electronic data files, of course we know they aren’t stored in tall metal cabinets with manila cards on the drawer faces denoting what’s inside. That’s so 1986. But even for those of us firmly grounded in...more

Ransomware Attack Highlights Importance of Preparation

Hollywood Presbyterian Medical Center in Los Angeles recently paid a $17,000 ransom in bitcoins to a malware hacker who seized control of the hospital's computer systems and demanded money ransom as a condition to returning...more

LegalTech New York 2016 Report

LegalTech New York 2016 took place in early February. Several Morris James attorneys and members of IT attended the event. As usual, the event attracted some of the best legal technology minds in the country....more

Trends, Challenges, Tech: E-Discovery Enters a New Era

E-Discovery is no longer in its infancy. A decade has passed since the 2006 FRCP amendment that made ESI discoverable, and in that time legal teams have been working out how best to successfully accomplish this process. ...more

#LTNY16: That’s a Wrap!

Whew! After three electrifying (and tiring) days, Legal Tech New York 2016 is in the books! For those of you that experienced the show first-hand, we don’t have to tell you that this year’s conference was another...more

The Life-Changing Magic of Information Governance: Cutting Costs and Mitigating Risk with IG

The New Year brings fresh starts, and most of us, after a season of giving and receiving, parties and celebrations, are feeling the need to take stock and streamline our lives. In the bestselling book, The Life-Changing...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

Our 2016 Resolutions for eDiscovery, Part 2

Last week, we discussed four eDiscovery resolutions that counsel should make as they kick off 2016. In this blog, we offer four more pearls of wisdom for counsel to consider as they tackle the New Year....more

Do Cyber Insurers Care about Information Governance?

As we welcome in 2016, awareness of the variety of information-related risks confronting today’s enterprises, and the availability of insurance covering those risks, is at an all-time high. High-profile data breaches caused...more

EBA consults on guidelines on ICAAP and ILAAP information

EBA is consulting on draft guidelines on the collection of information related to the internal capital adequacy assessment process (ICAAP) and the internal liquidity adequacy assessment process (ILAAP), which form part of the...more

Untrusted Advisor: How Your Law Firm May Fail to Protect Your Data

In recent years, the prevalence of data and information security breaches at major corporations have become increasingly more commonplace. While general awareness may be increasing, many companies are still neglecting to...more

55 Results
|
View per page
Page: of 3
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×