9/20/2013. Michael Salvarezza & Virginia MacSuibhne SCCE Conference, Washington D.C. October Need a picture of data volume
|
|
- Cecilia James
- 8 years ago
- Views:
Transcription
1 Michael Salvarezza & Virginia MacSuibhne SCCE Conference, Washington D.C. October Need a picture of data volume 4 1
2 5 6 Complexity of Information Governance Requirements Complexity of rapidly changing compliance landscape Complexity of corporate/legal structure Complexity of content/context Complexity of infrastructure Complexity due to sheer volume of information Small SMEs Current Generation Solutions Large SMEs Complexity of requirements grows exponentially with size of organization Fortune 2000 Fortune 550 Fortune
3 Social media and business transformation Explosive growth in volume of content creation Growing urgency to gain control of this dynamic Rapid expansion in laws and compliance regulations MiFID Title 21 CFR 11 PATRIOT ACT 8 Social Media promotes: Sharing Collaboration Open Rapid access to information Casual, informal, spontaneous communication Records Management is about: Governance Litigation Support Businesses care about: Agility Complexity Access to information Insights derived from information Speed and results 9 Policies might cover: social media, BYOD, mobile computing, cloud computing No policy can address all instances, so focus on principles and extend trust Focus on what is critical to the business to keep Recreate vs. capture 10 3
4 Lead with trust and then provide guidelines Encourage responsible use Frame policies to address responsibility, not productivity Grant equal access Provide training 11 The trouble with rules Copyright 2011 LRN Group Inc. All rights reserved Understand the benefits, and the risks of using social media, and include them in Record Management policy, procedures, and guidelines Understand the regulations that govern your company s use of social media FINRA, SEC, and other government agencies have regulations requiring the preservation of data on social media sites Privacy considerations Maintain any business records under your corporate records policies and procedures 13 4
5 Consider where the business record is created: If the record is created outside of the social media site, the copy posted to the social media site could be considered a convenience copy If transactional information created on a social media site is a business record under your policy, then have a mechanism in place to capture, store, search, and retrieve those records Ensure procedures specify that Records Managers review the social media site framework before the site is launched to assess capability for proper handling of business records Educate employees through training sessions and communications 14 Make sure the policy is enforceable. Do not rely on device specificity, make sure the policy is broad and general (devices become obsolete). Orient the policy from the business value perspective. Provide training on appropriate use of devices, proper management and security of information, segregation of personal and business data and IT information management controls. 15 Define accountabilities for control (user, IT, business unit, etc.) Address the distinction between personal and business data Ensure proper controls in the event of theft or loss of the device Provide coverage for business provided devices and personally owned devices Address funding of devices or the cost of controls, especially for personally owned devices Address different geographies Focus on both employees and contracted resources 16 5
6 Define the appropriate use of business records on mobile devices and address requirements for retention of records Security Awareness/Privacy Awareness/Compliance Human Resource considerations Use of devices for personal use Use of devices after hours and on personal time Use of devices while engaged in travel Inappropriate data and website access 17 Ease of deployment Application Whitelists & Blacklists App Security Screening Browser security Encryption Data wiping Business vs. Personal? Auto-provisioning? Location capabilities Inventory Reporting Service definition 2. Key legal concerns: indemnification, warranties, production of data 3. Security 4. Privacy 5. Contract renewal provisions and termination clauses 6. Disaster recovery and business continuity 7. Service Level Agreements and penalties 19 6
7 Information in social media, on mobile devices and in the cloud, like any electronic information, is discoverable Increasingly a target for discovery Contains candid discussions of thoughts, activities, intentions, photos, videos Information covered by legal holds must be preserved Includes social media potentially relevant to pending or reasonably anticipated litigation In company s possession, custody, or control 20 Early cases may confuse discoverability, accessibility, and privacy, but will evolve Companies will need to preserve information in their possession, custody, and control Employers will control information on company systems Employers will have authority over company information on employee systems Privacy considerations won t protect responsive information Employee privacy will not protect corporate information Employee privacy will not protect employee information from production by employees when relevant Third parties will have to respond to subpoenas 21 Data is scattered on many sites internal and external: Information on external sites is decentralized Social media sites present new retrieval and search challenges: Each third party maintains data differently and provides different rights to access Third parties are not subject to their clients preservation requirements, which may accelerate a company s need to retrieve information to which company has access that is covered by a legal hold Technical tools to capture social media sites or content lags behind need Search expertise is required to successfully query in the dialect of social media users 22 7
8 Work with your IT management to understand your internal capability to preserve information on social media sites and in the cloud Work with your lawyers regarding the contract terms that govern use of and retrieval from each site Investigate new software capabilities that can aid in preserving data by capturing dynamic web pages Learn what the tools can and cannot do to make the social media information available Learn what expertise is required to search this data effectively Demonstrate that the company has been thoughtful in preparation, has procedures, and methodically executes with a consistent, repeatable process that produces measurable results 23 New tools are tackling the capture of dispersed content The National Institute of Standards and Technology sponsors research into the effectiveness of search The Text Retrieval Conference (TREC) Legal Track is a research forum measuring the effectiveness of search in a legal context since 2006 Mock litigation context; applicable to compliance and records management Mock complaint and document requests Using publically available data sets Participants submit responsive documents Results are measured for: Precision how much of what is retrieve is on target Recall how much of the relevant information was retrieved 24 Search results vary widely Define procedures to locate, preserve, retrieve, and search content Internal sites External sites: contracts may control accessibility and timing Mobile devices Cloud infrastructure 25 8
9 Rethink We cannot solve our problems with the same thinking we used when we created them. Albert Einstein Corporate IT: Manage corporate information and IT infrastructure Corporate RM: Manage process of creating, maintaining, training and enforcing reasonable policies Legal Counsel: Manage organizational legal challenges in defensible manner Risk Officer: Manage risk matters within organization Privacy Officer: Oversee and manage compliance with Privacy laws and regulations Compliance Officer: Oversee and manage compliance issues within organization Security Officer: Manage security matters within organizations, including data security BOD: Board of Directors with primary responsibility for overseeing program and policies Other: Depends on organization. 27 Ambiguity is actually OK Take risks go on a TRIP Challenge the status quo try something different Find the value proposition Elevate the conversation 28 9
10 Leadership framework Copyright 2011 LRN Group Inc. All rights reserved It s a Journey Copyright 2011 LRN Group Inc. All rights reserved 10
Managing Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationInformation Governance in the Cloud
Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and
More information"Bring Your Own Device" Brings its Own Challenges
6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer
More informationSOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY
SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY Statement of Intent This policy establishes the general responsibilities for management, retention, and disposition of SOUTHWEST VIRGINIA
More informationAmendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents
Amendments to Federal Rules of Civil Procedure Electronic Discovery effective Dec. 1, 2006 Copyright David A. Devine GROH EGGERS, LLC Rules amended: 16, 26, 33, 34, 37 & 45 Sources of information: Rules
More informationInformation Archiving
Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive
More informationHosted ediscovery: Adoption, Use, and Results. September, 2011
Hosted ediscovery: Adoption, Use, and Results September, 2011 SaaS is a Delivery Model Of Cloud Computing Attitudes About SaaS Are Still Evolving Legal Community Embracing SaaS In general, are you leaning
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationLegal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
More informationLAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
More informationMeeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
More informationCloud Computing Questions to Ask
Cloud Computing Questions to Ask Pursuant to the Federal Cloud Computing Strategy 1 and the Cloud First policy, agencies are required to evaluate safe, secure cloud computing options before making any
More informationTHIS WEBCAST WILL BEGIN SHORTLY
If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! THIS WEBCAST WILL BEGIN SHORTLY Cloud-Based vs. On-Premise ediscovery
More informationEvery Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com
More informationTHE TOP LEGAL TECHNOLOGIES
THE TOP LEGAL TECHNOLOGIES Ellen Freedman, CLM Law Practice Management Coordinator Pennsylvania Bar Association THE TOP LEGAL TECHNOLOGIES Table of Contents 1. Speaker biography 2. PowerPoint presentation
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationFundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
More informationBusiness white paper. Lower risk and cost with proactive information governance
Business white paper Lower risk and cost with proactive information governance Table of contents 3 Executive summary 4 Information governance: the new business imperative 4 A perfect storm of information
More informationNightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
More informationUse of Mobile Apps in the Workplace:
Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged
More informationHow To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationBDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
More informationHow To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
More informationBYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More information# Is ediscovery eating a hole in your companies wallet?
1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing
More informationWhite Paper. Why Should You Archive Your Email With a Hosted Service?
White Paper Why Should You Archive Your Email With a Hosted Service? An Osterman Research White Paper Published January 2008 Executive Summary Email is the primary communication system and file transport
More informationCA Records Manager. Benefits. CA Advantage. Overview
PRODUCT BRIEF: CA RECORDS MANAGER CA RECORDS MANAGER HELPS YOU CONTROL AND MANAGE PHYSICAL, ELECTRONIC AND EMAIL RECORDS ACROSS THE ENTERPRISE FOR PROACTIVE COMPLIANCE WITH REGULATORY, LEGISLATIVE AND
More informationData Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
More informationEnabling and Protecting the Open Enterprise
Enabling and Protecting the Open Enterprise The Changing Role of Security A decade or so ago, security wasn t nearly as challenging as it is today. Users, data and applications were all centralized in
More informationINTERNATIONAL SOS. Data Retention, Archiving and Destruction Policy. Version 1.07
INTERNATIONAL SOS Data Retention, Archiving and Destruction Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: January 2009 Revised: 2015 All copyright in these materials
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationCORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
More informationNew E-Discovery Rules: Is Your Company Prepared?
November 2006 New E-Discovery Rules: Is Your Company Prepared? By Maureen O Neill, Kirby Behre and Anne Nergaard On December 1, 2006, amendments to the Federal Rules of Civil Procedure ( FRCP ) concerning
More informationElectronic Discovery
Electronic Discovery L. Amy Blum, Esq. UCLA University of California, Los Angeles 1 Topics Not Covered Best practices for E-mail E use and retention in the ordinary course of business Records Disposition
More informationCISM (Certified Information Security Manager) Document version: 6.28.11
CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationUNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia
More information39C-1 Records Management Program 39C-3
39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.
More informationInformation Governance
Information Governance The New Records Management Rudy Moliere Director, Information Goverance & Records Management Terrence J. Coan, CRM Senior Director Information Management Practice Agenda Introductions
More informationREED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS
REED COLLEGE ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS TABLE OF CONTENTS A. INTRODUCTION... 1 B. THE LANDSCAPE OF ELECTRONIC RECORDS SYSTEMS... 1 1. Email Infrastructure...
More informationTodd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group
Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationInformation Governance
Information Governance in-fər-ˈmā-shən\ˈgə-vər-nən(t)s: a holistic approach to managing business information by implementing processes, roles, controls and metrics that treat information as a valuable
More informationFIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS
FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE INTRODUCTION Any organization using Salesforce for customer relationship management
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationOUTLINE AND OBJECTIVES
BYOD in the Federal Workplace: Privacy Considerations and Case Studies Moderator: Alex Tang, Attorney, Office of General Counsel, Federal Trade Commission (FTC) Panelists: Kimberly Hancher, Chief Information
More informationInformation Governance, Risk, Compliance
Information Governance, Risk, Compliance April White Paper By Galaxy Consulting A At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract May 2014 Information is the lifeblood
More informationARCHIVING FOR EXCHANGE 2013
White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver
More informationTO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More informationDirector, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
More informationWhy cloud backup? Top 10 reasons
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
More informationEnhancing Cybersecurity with Big Data: Challenges & Opportunities
Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationPrivacy and Security Law Report
Privacy and Security Law Report Reproduced with permission from Privacy & Security Law Report, 12 PVLR 1929, 11/18/13. Copyright 姝 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com
More informationMANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
More informationMobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
More informationPolicy Outsourcing and Cloud Based File Sharing
Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...
More informationKey Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,
More informationLegal Project Management: A Tool for Corporate Counsel Topic #1
Legal Project Management: A Tool for Corporate Counsel Topic #1 Ann Marie McDonald, PMP CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012 Definitions Project : A temporary endeavour undertaken
More informationENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE
ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE JEFF LUNDBERG MAY 23, 2012 WEBTECH EDUCATIONAL SERIES ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE IT organizations are under
More informationJournal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
More informationhow can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
More informationRE: PCAOB Rulemaking Docket Matter No. 041: Concept Release on Audit Quality Indicators
Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, DC 20006-2803 September 29, 2015 RE: PCAOB Rulemaking Docket Matter No. 041: Concept Release on Audit Quality
More informationIMPLEMENTING YOUR BYOD MOBILITY STRATEGY
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the
More informationData Encryption in the cloud A Handy Guide
Data Encryption in the cloud A Handy Guide Table of Contents Introduction...01 Why Encryption is Different in the Cloud...02 Common Encryption Misconceptions Worth Rethinking...04 Encryption In Action
More informationArchiving Email for Compliance and Competitive Advantage
Archiving Email for Compliance and Competitive Advantage An Osterman Research Position Paper sponsored by Published September 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
More informationVeritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies
Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines
More informationHow to Avoid the Headache of User Mailbox Quotas
How to Avoid the Headache of User Mailbox Quotas Email Archiving Top Four Storage Management Challenges and Solutions Executive Summary Corporate email contains business critical information which is relied
More informationPutting Operators at the Centre of
Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified
More informationTRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT. Key Concepts Defined. Key Concepts Defined 4/30/2015
TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT William Saffady (718) 246-4696 wsaffady@aol.com Key Concepts Defined Governance the process or system by which an organization s
More informationBYOD Privacy and Security in Europe
BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,
More informationWhat Is BYOD? Challenges and Opportunities
Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device
More informationThe Next Frontier. for Records Managers. Retention and Disposition of Structured Data:
Retention and Disposition of Structured Data: The Next Frontier for Records Managers Establishing a relationship with IT managers and learning about the basics of system technology will help the records
More informationDon t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It
WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationCIOs: How to Become the CEO s Business Partner
CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate
More informationCan CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?
SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers
More informationReport on Hong Kong SME Cloud Adoption and Security Readiness Survey
Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly
More informationBook Review THE ELECTRONIC EVIDENCE AND DISCOVERY HANDBOOK: FORMS, CHECKLISTS, AND GUIDELINES
Book Review THE ELECTRONIC EVIDENCE AND DISCOVERY HANDBOOK: FORMS, CHECKLISTS, AND GUIDELINES by Sharon D. Nelson, Bruce A. Olson and John W. Simek American Bar Association 2006 745 pp. Reviewed by William
More informationPrivacy Policy & Identity Theft Prevention Program
Privacy Policy & Identity Theft Prevention Program Orcam Financial Group LLC PO Box 91098 4640 Cass St San Diego, CA 92109 (858) 220-5383 Orcam Financial Group LLC Privacy Policy February, 2014 Page 1
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationPreservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
More informationGAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
More informationSeven Essential Strategies for Effective Archiving
White Paper Seven Essential Strategies for Effective Archiving Sponsored by: Abstract Archiving helps organizations effectively retain, manage, and leverage their information assets. It is also complimentary
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationIG1: Information Management in the Age of the New Attorney
IG1: Information Management in the Age of the New Attorney LegalTech New York February 3, 2015 Dan Carmel HP, Moderator Marat Borodovskiy Prudential Financial, Panelist Bill Koch Womble Carlyle Sandridge
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationCloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
More informationRethinking Archiving: Exploring the path to improved IT efficiency and maximizing value of archiving solution investments
Rethinking Archiving: Exploring the path to improved IT efficiency and maximizing value of archiving solution investments Marshall Amaldas & Brad Nisbet, IDC Authors: Marshall Amaldas & Brad Nisbet, IDC
More informationsamsung mobility solutions discover business built in
samsung mobility solutions discover business built in the world s most popular devices are now ready for enterprise with business built in Samsung Mobility Solutions include a complete range of enterprise
More informationCAUSE& EFFECT: Cloud Decentralization Leads to Confusion and Risk
CAUSE& EFFECT: Cloud Decentralization Leads to Confusion and Risk On average, an organization is using 24 different file sharing services and 91 different collaboration services. This disjointed state
More informationRECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our stock price tumbling. I need to minimize our
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationPartner / E-Discovery Team Chair. Craig Roy Director of IT & E-Litigation Services
E-Discovery Business Readiness Drew Sorrell, Esq. Partner / E-Discovery Team Chair Craig Roy Director of IT & E-Litigation Services What is Business Readiness in terms of E-Discovery? Risk Adjusted Management
More informationB. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
More informationThe Benefits of Virtualization for Small and Medium Businesses. VMware SMB Survey Results
The Benefits of Virtualization for Small and Medium Businesses VMware SMB Survey Results W H I T E P A P E R Table of Contents Executive Summary............................................... 3 The Benefits
More information