New Technologies and Information Governance: Everything you need to know and more. April 14, 2016 Galina Datskovsky, Ph.D., CRM CEO, Vaporstream
|
|
- Marybeth Bruce
- 7 years ago
- Views:
Transcription
1 New Technologies and Information Governance: Everything you need to know and more April 14, 2016 Galina Datskovsky, Ph.D., CRM CEO, Vaporstream
2 About the speaker: Galina Datskovsky, Ph.D., CRM Dr. Galina Datskovsky is currently the CEO of Vaporstream. She has also served on the board of multiple startups, assisting with strategy. Formerly Vice President of Information Governance at Autonomy an HP Company. She served as Chair, President, President Elect and Director of ARMA International ( ) as well as fellow in She also served as Senior Vice President of Architecture at CA Technologies, responsible for corporate-wide architecture and design initiatives, as General Manager of the Information Governance Business Unit and as a Distinguished Engineer. She joined CA in 2006 with the acquisition of MDY Group International, where she served as founder and CEO. Galina is a Certified Records Manager (CRM) and is recognized around the world as an expert in Information Governance and associated technologies. She is the recipient of the prestigious Leahy award and a Fellow of ARMA International. She has been widely published in academic journals and speaks frequently for industry organizations such as AIIM, ARMA International, ILTA, IQPC and Cohasset Associates/MER. She received the NJBIZ: Best 50 Women in Business Award in April Prior to founding MDY, Galina consulted for IBM and Bell Labs and taught at the Fordham University Graduate School of Business and the Graduate School of Arts and Sciences at Columbia University. She earned her doctoral and master s and bachelor s degrees in Computer Science from Columbia University.
3 Agenda Mobility/Mobile Devices Cloud Social Media Big Data/ Data Lakes Retention and Disposition Revisited
4 MOBILITY/MOBILE DEVICES
5 Mobile Workforce Enablement By 2016 four in ten organizations will rely exclusively on a policy of Bring Your Own Device (BYOD) 1 By % of businesses will have some kind of BYOD or Corporate Owned Privately Enabled (COPE) programs in place by
6 Privacy and Security: Enabling Mobile Communication Assuring corporate data is separate from private data Handling potential data breach if phones are lost or stolen Protecting information once it leaves the device or tablet Sender control: recipient can copy, forward, paste, store or print
7 Data Loss Nightmares According to Accenture s mobility practice, the biggest risk to mobile workers isn t poor Wi-Fi security, it s employees who simply forget their laptops, PDAs and mobile phones in taxis, hotels and airplanes. 1 Examples of Mobile Device Loss and Data Breaches: Home Depot, Pfizer and the VA. Easier to deal with if data can be wiped off the devices or not stay there in the first place 1
8 Text Messaging & Mobile Chatting: The Next Wave Worldwide, over 350 billion text messages are sent each month. 1 Instant messaging dwarfs this number, at 50 billion per day, or 1.5 trillion per month Text Messaging Usage Statistics. (n.d.). Retrieved August 19, "50 Billion Instant Messages Expected to Be Sent Each Day in 2014." Business ETC. Accessed August 25, 2015.
9 Lessons Learned: Over 30 Years of Exposure by s that are copied, taken out of context, and propagated intentionally and unintentionally. Hitting SEND=Loss of content control. s frequently represent business records or evidence. s that are left unencrypted can be exploited in unintended ways. Recent Example: The Sony Pictures data breach. Other data leak examples are documented in Forester Report studies sited in:
10 Other Mobility Risks Text messages are even less likely than to be protected or secured Text and photo messaging can be difficult to audit, however required for many industries Communications are not always archived or retained appropriately to meet compliance requirements
11 Use an Existing Framework for Managing our Mobile Communications Generally Accepted Recordkeeping Principles Accountability Integrity Protection Compliance Availability Retention Disposition Transparency Information about ARMA International and the Generally Accepted Recordkeeping Principles can be found at
12 Principle of Protection Ensure corporate data and apps reside separately from private ones Ensure encryption is enabled on the corporate side Enable ability to wipe corporate data if phone is lost or stolen Ensure phone and/or corporate apps are pin code protected Enable handing phone to a third party without compromising corporate apps or data Encrypt in transit and on device Prevent propagation: control forwarding, store and print even on devices beyond organization s control Retain messages per policy in a single secure repository, not on devices.
13 Principle of Compliance Ensure communications are captured: healthcare, financial services, etc. Legal and regulatory requirements FRCP, SOX and HIPAA Audit for compliance with internal policies and legal considerations
14 Principle of Availability Enabling mobile communications provides timely, efficient communications that can be instant, accurate and secure Information is made available just in time for many urgent and confidential conversations
15 Principles of Retention and Disposition Mobile communications should be retained on mobile devices only as long as they are useful for active conversations. A retained secure copy should be kept under the organization s control for legal, regulatory, fiscal, operational, and historical requirements and disposed once organization retention policies have been fulfilled.
16 People, Process and Technology Policies for device management and control. Define data ownership: for example, data in the employee s BYOD or COPE managed device belongs to the company and can be cleared at company discretion. Policies for message retention Define how and mobile messages are retained for corporate use and regulatory purposes Policies for Application Usage Define which applications should be used for business , mobile messaging and chat Audit for compliance
17 Key Takeaways 1. Mobile Workforce Enablement and efficiencies can be accomplished without sacrificing security, privacy and compliance. 2. Have a framework for making and enforcing policies. 3. Establish executive team with accountability for governance. 4. Ensure technologies like encryption, secure ephemeral messaging and mobile device management are implemented for protection. 5. Understand organization and industry compliance requirements and help ensure that they are met for all content, including messaging/texts. 6. Ensure that confidential and private information is protected and accessible only by those who have access rights.
18 INFORMATION IN THE CLOUD
19 Topics Cloud Characteristics And Risks Information Management In The Cloud Preservation And Spoliation In The Cloud Collection In The Cloud ediscovery In The Cloud Authentication Of Cloud Data End Of Lifecycle Disposition End Of Vendor Relationship Mitigating Risk
20 The Cloud Is Here To Stay By 2018, more than 60% of enterprises will have at least half of their infrastructure on cloud-based platforms. 1 By 2019, more than four-fifths (86 percent) of workloads will be processed by cloud data centers; 14 percent will be processed by traditional data centers. 2 1.Source: Forbes Tech Round up Jan Source Cisco Global Cloud Index: Forecast and Methodology,
21 What Is The Cloud? Services Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Deployment Public Cloud Private Cloud Hybrid Cloud
22 Essential Characteristics of Cloud Services On Demand Self Service Broad Network Access Measured Service Resource Pooling Rapid Elasticity
23 Cloud Benefits Cost Savings Pay as you go Pay for service; No hardware costs Risk of hardware or software loss shared (cost and down time) Scalability Elasticity Application Development Low Cost Experimentation Potential Compliance and Security benefits
24 Cloud Risks Access Security Location Segregation Spoliation Service (export, analytics, costs, backup and recovery) Ownership Privacy Integrity Authentication Vendor Continuity
25 Are Retention And Business Practices In The Cloud Different? Storing data in the cloud does not relieve the organization of the responsibility for protection, management or retention of its data The Principles Risk Management EDRM and Discovery Processes Location Access and Security Possession, Custody and Control
26 Generally Accepted Recordkeeping Principles Accountability Transparency Integrity Protection Compliance Availability Retention Disposition
27 Electronic Discovery Reference Model
28 Information Management In The Cloud Risks Access Security Privacy Location
29 Information Management In The Cloud Risk Mitigation Capture sufficient data when information created to govern it Handle information in compliance with reasonable, defensible, and auditable protocols: use the Principles Establish clear rules and privacy expectations for use, access and security of systems, including social networking sites Not just perimeter security Work with the cloud provider to ensure information governance compliance Verify and limit data location
30 Preservation And Spoliation In The Risks Cloud Segregation/Identification Can cloud data be linked back to a custodian? Preservation Will the vendor comply with a legal hold, and how? Access Can you preserve on multi-user servers? Location - Where is the data?
31 Preservation And Spoliation In The Cloud Risk Mitigation Information Management How information created, stored and removed from cloud Metadata Segregation/commingling Understand how vendor conducts backup and recovery In Agreement Legal Hold Protocols: how will vendor will comply with legal hold Access rights for preservation Limit data storage locations Limit or prohibit subcontracting by the cloud provider Allocation of liability for loss
32 Collection In The Cloud Risks Segregation/Identification Access Export Options Costs
33 Collection In The Cloud Risk Mitigation Vendor Analytic Tools Metadata Access Rights for collection or forensic collection In Agreement Export Options Analytic Options Cost Options
34 E-Discovery and FOIA In The Cloud Scenarios Discovery requests or third party Subpoenas to the entity Subpoenas to the third party cloud provider
35 E-Discovery and FOIA In The Cloud Risks Possession, custody and control Who controls the data if a third party is hosting it? Complicated by deployment models of cloud computing the more third parties involved (through subcontracts, public cloud, etc.), the more complicated ownership gets
36 E-Discovery and FOIA In The Cloud Risk Mitigation In Agreement Ownership Access Notice Obligation Steps provider will take in response to subpoena Cost Apportionment Allocation of liability for wrongful disclosure
37 Authentication Of Cloud Data Risk Mitigation Chain of Custody Can vendor track creation, modification and access to your information contemporaneously through lifecycle System and Access Logs In Agreement
38 Is This The End? End of Information LifeCycle in the Cloud Disposition options: transfer, destruction Most vendors are not focused on disposition they are more likely to recover deleted items than to prove something was permanently deleted End of Relationship with your Cloud Vendor? What are the obligations for returning data upon termination, or if the vendor goes out of business?
39 Risk Mitigation At The End Risk Mitigation In Agreement Data Disposition Protocols Data Transfer and Ownership Agree on fees for data transfer and disposition
40 Risk Mitigation Summary Outline Risks Weigh Risk vs. Reward Investigate Provider Audit Practices Include Important Issues in the Vendor Agreement Consult with Counsel Consult Relevant Guidelines
41 WHAT IS SOCIAL MEDIA?
42 What is Social Media? Social Media Sites are online services or platforms that focus on building and reflecting social networks or relations among people Technically Web-based Mobile-based Blogs Picture and music sharing Wall-postings and instant messaging Presence detection
43 Types of Social Media Sites Collaborative projects (e.g., Wikipedia) Blogs and microblogs (e.g., Twitter) Content communities (e.g., YouTube) Social networking sites (e.g., Facebook) Virtual game worlds (e.g., World of Warcraft and Second Life)
44 Characteristics Public or private Potentially global audience / participants User content Interactive (not one way) Immediate 44
45 The Explosion Continues Facebook: >1.6 billion active monthly users; 1.6 billion mobile active users Twitter: >3.5 million monthly active users, 500 million tweets per day and 200 billion tweets per year LinkedIn: >414 million members in over 200 countries with executives from all Fortune 500 companies Instagram: >400 million active monthly users, 40 billion photos shared to date, an average of 80 million photos shared per day WhatsApp: >1 billion active monthly users, 1 million daily registrants, 30 billion messages sent daily YouTube: >1 billion users, 4.6 billion videos viewed per day, over 400 hours of video uploaded per minute
46 Business Benefits and Opportunities Connect and collaborate with constituents Sentiment of government agency performance Public relations Enable access and education
47 HOW DO WE ACHIEVE A BALANCED APPROACH?
48 We Want a Balanced Approach Fines Sanctions Loss of Reputation Loss of Revenue Personal Injury Risk Benefit Revenue Happy Customers Efficiency New Markets New Products How big? How likely? How often?
49 Risk of Sanctions: Implications Overpreservation Overreaction to Potential Sanctions Can Lead to Overpreservation, Panelists Warn, 12 DDEE 258 (July 5, 2012) Proportionality in prelitigation preservation decisions See Pippins v. KPMG, LLC, No. 11 Civ. 377 (CM)(JLC) (S.D.N.Y. Feb. 3, 2012)
50 BIG COMPANY & SOCIAL MEDIA: CASE STUDIES
51 Case 1: Marketing The Marketing Department has is using Social Media sites to market Big Company Power Tools Facebook Twitter LinkedIn Pintrest YouTube ( how to example) Second Life Benefits Immediate Inexpensive Fun Effective Expected
52 Case 1: Recordkeeping Implications Excerpt: BIG COMPANY RECORDS RETENTION SCHEDULE Advertisements & Marketing Materials 6 years Advertisements, testimonials, marketing literature, marketing surveys, brochures, inserts, direct mail pieces and other general sales materials for the Company's products and services. At a minimum, we need to update the record description Do record keeping requirements change because the materials are on social media?
53 What is Our Defense Against False Marketing? bpe.html
54 Case 1: Technical Implications What other media could be used for this? Apps for smart devices Tools to collect information interactive or static What is sentiment analysis and how should it be used?
55 Case 1: Legal Implications Are these records under our records retention policy? How do we ensure that policy is followed? What statutory/regulatory retention obligations do we have? How do we ensure that these obligations are followed? Generally, are we watching testimonials and/or statements about products that are accurate?
56 What is Our Defense Against False Marketing? Ask the questions posed earlier Who authored any testimonial? How accurate is what was said? Who made any other statement about a product? Is the statement accurate? If applicable, are we entitled to immunity under Section 230 of the Stored Communications Act?
57 Case 2: Product Instructions The Product Support Department is using crowd sourcing for help and how to for using Big Company power tools for home workshops. Business Benefit 24 X 7 availability Engaging for our customers Some great advice and creative solutions Great advertising for other Big Co tools
58 Case 2: Recordkeeping Implications Excerpt: BIG COMPANY RECORDS RETENTION SCHEDULE Product Manuals Life of Product Instruction and parts manuals provided to consumers with Big Company power tools. Hmmm.. What is Life of Product. Do we count the time the tools sit in consumers garages? Do crowd-sourced postings qualify as Big Company Product Manuals?
59 Case 2: Technical Implications How should we capture Official Records? Capture records of any disclaimers Record live all on-going interaction Capture official company postings and periodic snapshots of other interactions How do we manage Legal Hold? Depends on the methods chosen above, holds need to be applied to captured material, but may have to go to live recording in case of hold
60 Case 2: Legal Implications What if the crowd gives bad advice and someone gets hurt? Should we monitor and manage the postings? Is a disclaimer sufficient? What do we need to control?
61 Case 3: Recruiting The HR department is using Monster.com and LinkedIn for job postings and candidate identification. Managers are Googling candidates Benefits This is the best way to advertise our openings and find candidates Our job openings are accessible to any candidate worldwide
62 Case 3: Recordkeeping Implications Excerpt: BIG COMPANY RECORDS RETENTION SCHEDULE Recruitment / Job Posting Files 6 Years Records associated with recruitment efforts, including for example position reports, job requisitions, job postings, advertisements, applications, resumes, candidate job skill test results. HR Compliance Reporting 6 Years Compliance reports and associated statistical information, including for example, Affirmative Action Plans, EEO-1, and other employment filings. Social media job postings may fall into more than one HR record category.
63 Case 3: Technical Implications How should we capture Official Records for diversity reporting? Capture and record any official searches Make a record of searches conducted just as in the case of any other form of search Keep records of candidates rejected and reasons why, as well as statistics on candidates searched, just in case (e.g. Filing for an H1) How do we manage Legal Hold? If captured as above, hold is done through the normal RM software
64 Case 3: Legal Implications What restrictions apply for recruiting on the web? Is there a State law that forbids a prospective employer from doing so? Is it OK to look up a candidate s age? Are there ADEA implications? Big Company has a zero tolerance for porn. What if the manager finds the candidate has a racy blog or Facebook page?
65 Case 4: Employee use of Social Media to Discuss Big Company It has come to our attention that some employees are writing very negative comments about the Big Company work environment on Facebook, Twitter and some personal blogs Issues This could negatively impact our recruiting and reputation Management would like to ban this practice
66 Case 4: Recordkeeping Implications Excerpt: BIG COMPANY RECORDS RETENTION SCHEDULE Policies, Procedures and Directives Until outdated + 10 Years Final policies and procedures, plus supporting documentation related to the development of the policies and procedures Policies about employee use of social media are Big Company records Are the employees postings Big Company records?
67 Case 4: Technical Implications How do we monitor what employees are saying? Sentiment Analysis Software How do we know they are employees? Particularly bad postings can be further investigated to determine identity. It is normally not kept secret and can be cross-referenced through the personnel system
68 Case 4: Legal Implications Can Big Company bar employees from saying negative things about the company? Is there a difference between Big Company and a public employer (Quon v. City Of Ontario)
69 Case 4: Legal Implications The role of Agencies Hannah v. Northeastern State University, 2014 Denial of tenure tied to racial discrimination proven in Facebook posts. Ehling v. Monmouth-Ocean Hosp. Service Corp, 2012 Invasion of privacy when an employer accessed a private Facebook account Reid v. Ingerman Smith LLP, 2012 legal secretary suing for harassment is entitled to private postings to plaintiff s social media accounts that reveal, refer, or relate to any emotion, feeling or mental state, where posts on publically available pages contradict plaintiff s claims of mental anguish resulting from harassment CDM Media USA, Inc. v. Simms, 2015 Breach of contract by former employee via refusal to cede control of professional LinkedIn group. State v. Harris, 2012 No reasonable expectation of privacy in the information intentionally broadcast to the world
70 GOVERNANCE
71 Social Media Policies Explain why the policy is important to the Company Be clear about what is not allowed Define appropriate behavior Monitor use Define consequences The Social Media Policy should not simply say NO
72 Elements of Governance Formal grants of authority Who gets to decide? Documented Laws - Rules of the Road Rules make everyone safer Processes for change How do you change rules or grant of authority? Oversight and continuous improvement Risk-based goals Clear metrics and audits Are corrective actions needed?
73 The Need for Active Governance Should we create a permanent committee of various interest groups or will we create an ad hoc committees as needed? Are there existing committees that could take on this role? What is the role of compliance? How often are these meeting? Who responds to inquiries from the outside?
74 Risk-Based Continuous Improvement WHO Risk/ Value Assessment and Governance Goals PLAN HOW Governance Review and Action ACT DO Execute Improvement Plan CHECK Measure and Report Results
75 BIG DATA AND DATA LAKES Vaporstream Confidential
76 Definition and Market Size In information technology, big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications. The challenges include capture, curation, storage, search, sharing, analysis, and visualization. (Wikipedia) Dark Data is like that furniture you have in that Dark Cupboard. Dark data is the cute name given to all that data an organization gathers that is not part of their day to day operations. It is old stuff, stuff that turned up in the mail that you kept, just in case. It is data that you didn t erase, because it might come in handy some time. (Gartner Blog by Andrew White) According to IDC, the big data technology and services market is expected to grow at a compound annual growth rate (CAGR) of 23.1% between with annual spending reaching $48.6 billion in LegalTech New York 2013
77 Data Lake Defined A data lake is a large object-based storage repository that holds data in its native format until it is needed. searchaws.techtarget.com/definition/data-lake (last visited July 25, 2015) Gartner s definition: A data lake is a collection of storage instances of various data assets additional to the originating data sources. These assets are stored in a near-exact, or even exact, copy of the source format. The purpose of a data lake is to present an unrefined view of data to only the most highly skilled analysts, to help them explore their data refinement and analysis techniques independent of any of the system-of-record compromises that may exist in a traditional analytic data store (such as a data mart or data warehouse). (last visited July 31, 2015)
78 Further Definition While a hierarchical data warehouse stores data in files or folders, a data lake uses a flat architecture to store data. Each data element in a lake is assigned a unique identifier and tagged with a set of extended metadata tags When a business question arises, the data lake can be queried for relevant data, and that smaller set of data can then be analyzed to help answer the question The term data lake is often associated with Hadooporiented object storagehttp://searchaws.techtarget.com/definition/data-lake (last visited 7/27/15
79 Beware Of The Data Lake? While the marketing hype suggests audiences throughout an enterprise will leverage data lakes, this positioning assumes that all those audiences are highly skilled at data manipulation and analysis, as data lakes lack semantic consistency and governed metadata Gartner Says Beware of the Data Lake Fallacy (Press Release) (July 28, 2014) (last visited July 25, 2015)
80 The Data Lake In Practice Some questions related to a data lake: Who decides what goes in? What goes in? How is content organized? Who has access rights and how do you secure information and resulting objects? Chain of custody? How long is the data really useful?
81 Applying The Relevant Principles Integrity Provenance Chain of Custody Protection Security (data may be quite disparate) Privacy Personally identifiable information (PII) Compliance What are the applicable regulation for the raw data and the end product? Discovery and Production
82 Applying The Relevant Principles Availability Access Rights Available Metadata System longevity Transparency Discovering the content and providing appropriate response Retention Length of useful life Data migration Disposition When, what and how Getting rid of ROT using Big Data algorithms
83 BIG Data and BIG Security Data Origin Original Security Securing the combined blobs Maintaining access controls
84 Making The Data Lake Consistent With Good Governance Make sure you are in the conversation Know what data is going into the lake and point out policy considerations consistent with the principles just covered Don t dwell on data retention data will certainly overstay the original retention schedule Emphasize Data Security Focus on other principles that will allow the business easy access and ethical use
85 Making the Data Lake and Big Data Consistent with Good Governance (Continued) Don t try to stop the inevitable Be a business enabler, therefore focus on anything other than disposition Manage the lake as a big blob Manage the mined results in accordance with data usage Notify Legal Counsel of new data location Discovery of results as well as raw data is an important consideration
86 General Takeaways: Retention and Disposition With new technology retention schedules need to be updated: social media, data lakes, etc.. Schedules may be functionally based, not just legally based Adopt and Adjust to the new world Check your contracts very carefully Don t look at retention and disposition in a vacuum
87 General Takeaway: Get Started and KEEP GOING Identify stakeholders Establish governance processes consistent with your organization s culture Do your homework Use of social media Requirements and implications Risk / Benefit profile Governance approach Measure and report results Then do it again!
88 Case Law and Social Media The Stored Communications Act: See Crispin v. Christian Audigier, 717 F. Supp. 2d 965 (C.D. Ca. 2010) Discovery of social media, representative decisions: EEOC v. Simply Storage Mgm t, 270 F.R.D. 430 (S.D. Ind McCann v. Harleysville Ins. Co., 2010 WL (N.Y. Sup. Ct. App. Div. 2010) Offenback v. L.M. Bowman, 2011 WL (M.D. Pa. June 22, 2011)
89 Resources The Principles of the Business Data Lake (Capgemini: undated) (last visited July 27, 2015) Gartner IT Glossary (last visited July 31,2015) M. Fowler, DataLake (Feb. 5, 2015) (available at (last visited July 27, 2015) Data Mining from A to Z: Better Insights, New Opportunities (SAS: undated) (available at html (last visited July 27, 2015) B. Stein & A. Morrison, The Enterprise Data Lake: Better Integration and Deeper Analytics (PWC: June 1, 2014) (available at (last visited July 27, 2015)
90 Resources FTC Report, "Big Data: A Tool for Inclusion or Exclusion?" (January 2016). Available at Much Needed Meat on Security Requirement Bones: Report from California s Attorney General. FTC Closing Letter to Morgan Stanley Smith Barney (Aug. 10, 2015). Available at
91 Q&A
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationHow To Manage Records In A Cloud
Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach Patricia C. Franks, PhD, IGP, CA, CRM International Symposium October 17, 2014 to mitigate risk Not all information
More informationSocial Media & ediscovery: Untangling the Tweets for the Trials
Social Media & ediscovery: Untangling the Tweets for the Trials Jack Halprin, Esq. Vice President, ediscovery & Compliance POWER PROTECT PROMOTE Agenda Social Media Sites: What, Who, Where & How Discoverability
More informationTHIS WEBCAST WILL BEGIN SHORTLY
If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! THIS WEBCAST WILL BEGIN SHORTLY Cloud-Based vs. On-Premise ediscovery
More informationRetention & Disposition in the Cloud Do you really have control?
InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October
More informationSocial Media E-Discovery: Process & Technology
Social Media E-Discovery: Process & Technology Presented by: John Patzakis, X1 Discovery, Inc. Don Swanson, Five Star Legal and Compliance Systems, Inc. Hosted by LexisNexis and X1 Discovery Social Media
More informationZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper
ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide
More informationFundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
More informationElectronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
More informationHealthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte
Healthcare Data in the Cloud A Gathering Storm of Governance Erik Pupo Senior Manager, Deloitte Objectives for this Webinar Explain what the healthcare cloud really means Highlight emerging challenges
More informationTop 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
More informationInformation Governance in the Cloud
Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and
More informationCloud Services and Business Process Outsourcing
Cloud Services and Business Process Outsourcing What security concerns surround Cloud Services and Outsourcing? Prepared for the Western NY ISACA Conference April 28 2015 Presenter Kevin Wilkins, CISSP
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationCLOUD COMPUTING. 11 December 2013 TOWNSHIP OF KING TATTA 1
CLOUD COMPUTING (outsourcing records storage) TATTA SRINIVASA RECORDS MANAGER 11 December 2013 TOWNSHIP OF KING TATTA 1 Cloud computing A style of computing where scalable and elasticity ITenabled capabilities
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationThe Impact of Social Media on Damages in Employment Litigation. By: Angie C. Davis and Mary Wu
The Impact of Social Media on Damages in Employment Litigation By: Angie C. Davis and Mary Wu Everyone Facebook stalks - even (or shall I say especially) plaintiff and defense lawyers in Employment lawsuits.
More informationMiguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
More informationInformation Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
More informationHow the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
More informationIntegrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
More informationElectronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.
Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting
More informationBDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
More informationSocial Media and Records Management. ½ Day Seminar Priscilla Emery President e Nterprise Advisors
Social Media and Records Management ½ Day Seminar Priscilla Emery President e Nterprise Advisors Course Objectives At the end of this Seminar you will be able to: Have a solid understanding of the nature
More informationHow To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
More informationNavigating Information Governance and ediscovery
Navigating Information Governance and ediscovery Implementing Processes & Technology to Reduce Downstream ediscovery Cost and Risk Shannon Smith General Counsel, Globanet March 11 12, 2013 Agenda 1 Overview
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationSocial Media Discovery: It's Not So Different After All
Social Media Discovery: It's Not So Different After All by Cris Whitman As the use of social media continues to grow, so do concerns about preserving and collecting related content. Topics surrounding
More informationLowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007
Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential
More informationDirector, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
More informationHow To Manage An Electronic Discovery Project
Optim The Rise of E-Discovery Presenter: Betsy J. Walker, MBA WW Product Marketing Manager What is E-Discovery? E-Discovery (also called Discovery) refers to any process in which electronic data is sought,
More informationAllison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division
Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division Jason R. Baron Director of Litigation National Archives and Records Administration 1 Overview Cloud Computing Defined
More informationXact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013
MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??
More informationDOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
More informationGuide to Information Governance: A Holistic Approach
E-PAPER DECEMBER 2014 Guide to Information Governance: A Holistic Approach A comprehensive strategy allows agencies to create more reliable processes for ediscovery, increase stakeholder collaboration,
More informationAgent Social Media Policy
Agent Social Media Policy Addendum to the Agent Advertising Guidelines November 2013 For agent use only. not to be used for consumer solicitation purposes. Addendum to Agent Advertising Guidelines Agent/Producer
More informationKeeping a Finger on the Pulse of Social Media in Healthcare: Understanding Evolving Roles and Risks
Keeping a Finger on the Pulse of Social Media in Healthcare: Understanding Evolving Roles and Risks Viviane Jesequel, RN, BS, HCRM Social media is simply a broad umbrella term that covers a wide range
More informationDiscovery of Social Media: The Seventh Circuit E-Discovery Pilot Program. Ronald L. Lipinski, Seyfarth Shaw LLP Jay C. Carle, Seyfarth Shaw LLP
Discovery of Social Media: The Seventh Circuit E-Discovery Pilot Program Ronald L. Lipinski, Seyfarth Shaw LLP Jay C. Carle, Seyfarth Shaw LLP 04/05/2013 Before we get started I. Intro a) Definition &
More informationThird Thursday Crowell & Moring s Labor & Employment Update June 20, 2013
Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013 The webinar will begin shortly. Please stand by. Today s Presenters Chris Calsyn Robin Campbell David Cross Tom Gies 2 BYOD Employment
More informationCMA Shipping 2015. Ethics and E-Discovery in Shipping Disputes
CMA Shipping 2015 Ethics and E-Discovery in Shipping Disputes March 25, 2015 Vincent J. Foley, Holland & Knight LLP (212) 513-3357 vincent.foley@hklaw.com CMA Shipping 2015 Ethics and E-Discovery for Shipping
More informationWant To Be My Friend? Social Networking & Ediscovery
Want To Be My Friend? Social Networking & Ediscovery Michael A. Avalos, Esq., Assistant General Counsel, AIG Jonathan E. Sachs, Esq., Senior Account Executive, Kroll Ontrack July 23, 2014 Discussion Overview
More informationSocial Media is Pervasive
HR Liabilities of The Digital Age ABC Webinar September 29, 2010 Social Media is Pervasive Facebook 500+ million users Blogs 200 million bloggers Twitter 75 million users LinkedIn 50 million users Results
More informationCloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
More informationE-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
More informationCloud Computing and Big Data
Cloud Computing and Big Data. What s the Big Deal? Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management
More informationHot Topics and Trends in Cyber Security and Privacy
Hot Topics and Trends in Cyber Security and Privacy M. Darren Traub March 13, 2015 Cyber Attacks Ranked Top 5 Most Likely Risks in 2015 - The World Economic Forum Recent Global Headlines Include: 1 Where
More informationInformation Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
More informationElectronic Discovery: Litigation Holds, Data Preservation and Production
Electronic Discovery: Litigation Holds, Data Preservation and Production April 27, 2010 Daniel Munsch, Assistant General Counsel John Lerchey, Coordinator for Incident Response 0 E-Discovery Rules Federal
More informationInformation Governance: A Presidential Perspective. (ARMA Presidents, that is)
Information Governance: A Presidential Perspective (ARMA Presidents, that is) President Elect Fred Pulzello Fred A. Pulzello, MBA, CRM, IGP has 20 years of experience in records and information management
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationThe Financial Advisor s Guide to Social Media Regulations
The Financial Advisor s Guide to Social Media Regulations For US, UK and Canada With the right preparation and attention to detail, firms should feel confident about their ability to reach out to customers
More informationESI Risk Assessment: Critical in Light of the new E-discovery and notification laws
ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational
More informationWhat We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs
What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management
More informationConsiderations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
More informationThe Importance of Information Governance and Risk Management
Information Governance what it is and how it relates to your customers Julie J. Colgan, IGP, CRM 2015 PRISM Annual Conference How much of the world s data was created in the last 2 years? 30% 50% 70% 90%
More informationCloud Computing and Big Data What s the Big Deal
Cloud Computing and Big Data What s the Big Deal Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com Optimize tomorrow today. 1 Agenda Introduction Cloud Computing
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationCloud Computing and Big Data. What s the Big Deal?
Cloud Computing and Big Data. What s the Big Deal? Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management
More information# Is ediscovery eating a hole in your companies wallet?
1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationOwn, launch, grow and support your cloud backup and recovery offering
Asigra Hybrid Partner Program Own, launch, grow and support your cloud backup and recovery offering Recovery is Everything Get powered by Asigra. Deliver your own backup service, be a data recovery specialist,
More informationDOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS
Overview. DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS A comprehensive and consistently applied document retention policy is necessary to reduce the risk of being charged with spoliation
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile
More information10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
More informationReduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
More informationPurpose. Introduction to the Guidelines. Social Media Definition. http://www.ohioerc.org
http://www.ohioerc.org Purpose SOCIAL MEDIA: THE RECORDS MANAGEMENT CHALLENGE As society shifts from traditional methods of recordkeeping to electronic recordkeeping, the issues surrounding the management
More informationFIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
More informationOgden City. What HAS and has NOT worked for us in making policies...
Ogden City What HAS and has NOT worked for us in making policies... Records Management Ogden is on it's third system Can you find all the data you need for your single view of the customer? At Ogden City,
More informationStorage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Enterprise Architecture and the Cloud Author and Presenter: Marty Stogsdill, Oracle SNIA Legal Notice The material contained
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationSocial Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationWhy You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based
More informationOvercoming Potential Legal Challenges to the Authentication of Social Media Evidence
Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence By John Patzakis 1 Summary: Social
More informationEthics and ediscovery
Ethics and ediscovery John Mansfield and Devon Newman January 6, 2012 1 2013, MansfieldLaw ediscovery basics We will cover: Preservation and spoliation Searching and producing documents Supervising lawyers
More informationCurrent Trends in Litigation Involving the Use of Social Media
Current Trends in Litigation Involving the Use of Social Media John B. Kearney Partner and Head, New Jersey Litigation Group Ballard Spahr LLP 1 Introduction Social media now affect all phases of litigation
More informationFuture Proof Your ediscovery Practices
FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting
More informationMEETING COMPLIANCE REQUIREMENTS WITH DOCUMENT MANAGEMENT SOFTWARE BY JAMES TRUE
2009 Cabinet NG, Inc BY JAMES TRUE Table of Contents Introduction... 3 What is Compliance?... 3 Key Compliance Elements... 4 Managing documents... 4 Enforcing security/disaster recovery... 6 Auditing activities...
More informationAllison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationinto HIPAA Ian Campbell and The information a service to Short Act, HIPAA "Administrative use to host contract with an Documentation regulations.
7 Things all Law Firms (and their IT staff) ) need to know about HIPAA Ian Campbell and Gavin W. Manes, Ph.D. The information contained herein is for informational purposes only as the public, and is not
More informationA United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint
BUYER CASE STUDY A United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint Vivian Tero IDC OPINION Global Headquarters: 5 Speen Street
More information2H 2015 SHADOW DATA REPORT
2H 20 SHADOW DATA REPORT Shadow Data Defined: All potentially risky data exposures lurking in cloud apps, due to lack of knowledge of the type of data being uploaded and how it is being shared. Shadow
More informationArchiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
More informationProfessional Responsibility and New Technology
Professional Responsibility and New Technology Kelly A. Campbell Spencer Fane Britt & Browne LLP Presentation to Association of Corporate Counsel May 9, 2012 Overview Competence: Duty to know Social Media
More informationHow Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
More informationMeaning Based Computing: Managing the Avalanche of Unstructured Data
Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information
More informationSystems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer wdevine@us.ibm.com twitter: mac_devine Forecast for
More informationSecurity and Employee Monitoring Security and
Security and Employee Monitoring 2 Security & Employee Monitoring Firewalls and anti- virus solutions are fine for protecting your perimeter, but they won t help if your Employees let your business get
More informationCORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
More informationInformation Governance
Information Governance The New Records Management Rudy Moliere Director, Information Goverance & Records Management Terrence J. Coan, CRM Senior Director Information Management Practice Agenda Introductions
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationA COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
More informationThe E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
More informationCertified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
More informationARMA: Information Governance: A Revenue Source Potential
ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally
More informationAgenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
More information