A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
[Webinar] You Are Here: First Steps in Data Mapping
The CCPA for the Land Title Industry: Practical Compliance With CCPA and New Privacy Laws
E7: The DataSmart Method of Valuing Data Assets
Governance, risk, and compliance (GRC) can feel like thankless work at times. You can’t ship risk mitigation to market. It's not usually reflected on your balance sheet. Only especially canny investors notice the absence of...more
In the fast-paced world of energy trading, where every decision relies on accurate data, the success of your Energy Trading and Risk Management (ETRM) system, especially when working with RightAngle, depends on a solid...more
On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more
Following the update to the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) Enforcement and Penalty Guidelines, the Committee has continued to signal its intention to more heavily leverage...more
When it comes to data privacy, what are the biggest sources of risk for businesses? According to a recent IAPP-KPMG Privacy Risk study, businesses see regulatory compliance, data management and data governance as their top...more
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
In the legal operations realm, eDiscovery has always been a critical function, but the rapid advent of digital technologies has dramatically increased its complexity. While these advancements offer new tools for communication...more
Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more
In a time where it seems like everyone is working remote, at least to some degree, it is more challenging to navigate internal investigations. When the pandemic struck, many organizations did not have time to create a...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
While your organization may not regularly be involved in costly or complicated litigation, there are instances in which it may nonetheless be required to identify, collect, and produce documents most likely in the form of...more