News & Analysis as of

Data Retention Compliance Information Governance

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

HaystackID

[Webcast Transcript] Data Minimization: Why Less is More

HaystackID on

Editor’s Note: Effective data management is more critical than ever, and the latest HaystackID® webcast, “Data Minimization: Why Less is More,” offered expert insights on why organizations must take a strategic approach to...more

Society of Corporate Compliance and Ethics...

Data Retention and Document Holds

So the IT folk can’t wait for your business people to delete those old documents, meantime, the business people want to hold onto them because they never know when they might need that info again. Then, all of a sudden...more

Thomas Fox - Compliance Evangelist

Assessing Communication Compliance: Ephemeral Messaging and Retention

I recently had the opportunity to visit with Alex Cotoia, Regulatory Manager, and Daniela Melendez, an Associate at The Volkov Law Group, on the importance of addressing electronic communications preservation and management...more

BakerHostetler

DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between...

BakerHostetler on

As we noted in our 2023 DSIR, there has been a flurry of activity within the information governance space, at home and abroad. This activity deserves further analysis, because while it seems from a distance that there are...more

Womble Bond Dickinson

The 1, 2 Step of Data Retention

Womble Bond Dickinson on

Womble Bond Dickinson’s The Evolving Dance thought leadership series continued with a look at current challenges involving data retention and e-discovery. In particular, the session looked at employee use of personal devices...more

Ankura

Build A Data Inventory That Benefits Everyone

Ankura on

A data inventory is the fundamental building block for an effective privacy program.  In its simplest form, a data inventory can be thought of as a matrix which documents 1) what personal data is being collected by the...more

Reveal

Information Governance: Insights From The Roundtable

Reveal on

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. On average, organizations use 88 applications to power their workforce, a 21% increase from just three...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide