We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023.
This episode dives deeper into information governance and...more
On October 24, the Austria, Berlin, Frankfurt, Hamburg, Leipzig, Luxembourg, Munich, Rhine-Ruhr, Stuttgart and Switzerland IAPP (formerly known as the International Association of Privacy Professionals) KnowledgeNet chapters...more
Organizations whose mantra is “We just never delete anything” (i.e., organizations simply retaining all information indefinitely) are now facing headwinds, especially when the information contains personal information. As our...more
10/16/2024
/ Books & Records ,
California Consumer Privacy Act (CCPA) ,
CFTC ,
Data Preservation ,
Data Retention ,
Department of Justice (DOJ) ,
Electronic Communications ,
Electronically Stored Information ,
Enforcement Actions ,
Evidence ,
Federal Trade Commission (FTC) ,
Information Governance ,
Instant Messaging Apps ,
Investigations ,
Mobile Devices ,
Personal Information ,
Policies and Procedures ,
Recordkeeping Requirements ,
Regular Business Communications ,
Securities and Exchange Commission (SEC) ,
WeChat ,
WhatsApp
As we noted in our 2023 DSIR, there has been a flurry of activity within the information governance space, at home and abroad. This activity deserves further analysis, because while it seems from a distance that there are...more
8/31/2023
/ CNIL ,
Compliance ,
Data Protection Authority ,
Data Retention ,
EU ,
General Data Protection Regulation (GDPR) ,
Gramm-Leach-Blilely Act ,
Hungary ,
Information Commissioner's Office (ICO) ,
Information Governance ,
Italy ,
Privacy Laws ,
Regular Business Communications ,
State Privacy Laws ,
UK
For those attorneys and information governance practitioners unfamiliar with recent pedagogic advancements, “real-world problem solving” moves teaching approaches away from the classical model that assumes individuals will...more
Many businesses have remote work and bring-your-own-device policies that cover access to company systems and information from personal devices. ...more
Outside hacking attacks grab headlines. Data breach concerns cause sleepless nights within the C-suite of many organizations. And ransomware strikes fear into companies without sound backup practices and true Information...more
2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more
In some respects, 2013 seemed like a conversation between Vladimir and Estragon. Some commentators likened it to a simple, unified message that finally had E-Discovery practitioners, litigators in general, and affected...more
2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more