Technology Assisted Review Goes Left: Predictive Analytics In Information Governance

Size: px
Start display at page:

Download "Technology Assisted Review Goes Left: Predictive Analytics In Information Governance"

Transcription

1 BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.

2 Agenda I. Why Are We Here? II. What Is Predictive Analytics? III.Modernizing Information Governance A. Modernizing Records Retention B. Information Classification C. Defensible Deletion IV.Moving Forward 2

3 Why Are We Here? Gartner predicts that, by 2017, 33 percent of Fortune 100 organizations will experience an information crisis, due to their inability to effectively value, govern and trust their enterprise information. Press Release, Gartner, Inc., Gartner Says One-Third of Fortune 100 Organizations Will Face an Information Crisis by 2017 (Feb. 27, 2014)

4 Consequences of Increased Data Volumes Increased IT infrastructure costs 78% Cannot find information when needed 73% Increased regulatory compliance risk 67% Increased e-discovery costs 59% Need to recreate information previously created Increased risk of data leakage Increased complexity of protecting intellectual property or trade secrets 41% 49% 47% No serious consequences 2% Source: Council for Information Auto-Classification, The Information Explosion: How Organizations are Dealing With It (Oct 2011) (available at 4

5 Litigation and Regulatory Risks Risk of sanctions for failures to identify, preserve, or collect relevant data Risk of missed deadlines and sanctions resulting from inability to respond timely and effectively to discovery requests Risk that cost-prohibitive e- discovery influences settlement dynamic Risk of cross-border conflicts between U.S. discovery obligations and foreign privacy laws 5

6 Data Privacy and Security Risks Risks of violating data privacy laws, for example: 6 Improper (unsecure) handling of protected information, such as social security numbers, financial accounts, etc. Data leakage to locations outside company s environment (e.g., personal devices, Dropbox, Google) Retention of information past required destruction (e.g., upon expiration of purpose) Inadvertently transferring protected data out of jurisdiction Risk of losing protected or sensitive information in data breach, potentially resulting in notification obligations, regulatory or civil exposure, damage to reputation, and other harm to company Risk of audit failures (internal or external) exposed to customers, clients, or regulators, or publicly through discovery in litigation

7 Data Security Challenges Safeguarding data and protecting information security systems is increasingly complicated International consumer base accessing sites online Cloud computing / third-party service providers The human component Persistent, coordinated cyberattacks Corporations face significant risks: Loss of intellectual property and operational disruption Customer litigation, regulatory enforcement, or shareholder lawsuits 7

8 Compliance Risks Accelerating global regulations FCPA, Dodd-Frank, GLBA, SOX, Basel III, AML, ABC, PCI, etc. Compliance violations more difficult to detect where offending data obscured by millions of other grains of sand Noise created by debris hinders performance of predictive analytics and other tools and processes that otherwise might detect violations Less sensitive data potentially to land in insecure storage

9 Risks In Dark Data o o o o Risk of legal liabilities, compliance violations, smoking guns, and other unpleasant surprises lurking in dark data Clogged systems can obscure legal liabilities and compliance issues and make identification difficult even upon search and inquiry Unknown liabilities may be identified, or known liabilities may increase in severity, through due diligence in connection with business transactions or other sensitive negotiations Expired data produced in litigation or regulatory proceedings can trigger additional lawsuits or investigations 9

10 The Internet of Things Digitization of the Physical World: Physical objects are equipped with unique identifiers that can be digitally tracked RFID tags used to identify and inventory objects (and by proxy, people) Smartphone control: sensors embedded in object send data to smartphone, informing user s actions Currently focused on home systems and appliances (home security, smart appliances, thermostats)

11 And The Challenges Are Not Going Away 50-fold growth in the digital universe from the beginning of 2010 through the end of Zettabytes in 2020 will be equivalent of: 57 times the amount of all of the grains of sand on all the beaches on earth Saved on Blu-ray discs, without sleeves or cases, would weigh as much as 424 Nimitz-class aircraft carriers 5,247 GB of data for every person in the world And the Internet of Things (Exabytes) ,000 35,000 30,000 25,000 20,000 15,000 10,000 5, Source: IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East (Dec. 2012)

12 12 What Is Predictive Analytics?

13 What Is Predictive Analytics?

14 Predictive Analytics Is Everywhere

15 15 The Electronic Discovery Reference Model

16 16 The Electronic Discovery Reference Model

17 Predictive Analytics In IG Leverages technology to backstop humans Even low tech auto-classification can be very effective at identifying certain sensitive information types Policy rule engines Word indexes and metadata Complex and challenging to maintain Difficult to scale Machine learning tools

18 Classification Through Machine Learning Applying lessons learned in e-discovery, earlier in information lifecycle Growing body of research showing computer-assisted classification to be as or more effective than human classification Question is not whether any approach is perfect; question is whether it s more effective than alternatives Solid acceptance by courts and regulators in litigation and enforcement contexts Effective for early warning systems Not an easy button requires significant up-front work and ongoing maintenance, but potential to be more effective and efficient over long run

19 How Does Auto-Classification Work? Training Classification Validation Application Humans teach machine classification from sample documents Machine applies learning to other documents and classifies them Humans QC machine output and provide further training if needed Machine classification becomes one aspect of overall IG process 19

20 20 Modernizing Information Governance

21 Modernizing Information Governance Looking forward, looking back Leveraging technology to break down traditional information silos Key issues to address: Types of records Variety of storage media Regulatory sprawl Data protection laws International considerations Accessibility to end users Legacy data stores

22 Looking Forward Active and newly created records Integration of IG, business, legal, and compliance Potential compliance functions: Enhancing security of sensitive data Segregation Access controls by user, content type, or other criteria specific to individual records Anonymization, redaction, and expungement Surveillance and early warning systems Automated legal holds, disposition upon expiration, and other handling

23 Automating Information Governance Tired but true: People, process, and technology. Identifying and capturing records Classification through content templates Classification through user-selected folders Hybrid classification: User-based but analytics provides defaults, performs QC, etc. Machine-based: Analytics-based using rules and algorithms to identify and classify records Data security Machine-powered security classification, redaction and/or expungement

24 Further Applications Managing records Assign retention periods based on machine classification Ability to manage-in-place, and know what s being managed Accessing records Search on steroids using text- and concept-based search Automated disposition according to retention schedule Used properly, powerful means of driving compliance Process requires necessary checks and approvals

25 Looking Back Classification of existing records Identify and secure sensitive information already dispersed throughout organization Remediation of expired data, a/k/a, defensible deletion Reduce unnecessary retention Reduce storage and litigation costs Reduce legal and compliance risks Create business value

26 Benefits of Defensible Data Reduction Reduce legal and compliance risks Data privacy and security Elimination of dark data mitigates surprise smoking guns Organization knows what it has and what its risks are Save money Hard and soft costs associated with data storage and maintenance E-discovery and regulatory response Create business value Operating efficiencies, e.g., IT staffing and infrastructure Employees better able to find information when needed Business better able to extract value from data that remains 26

27 27 Moving Forward

28 It Takes A Village Internal several stakeholders, including: Records Management Information Technology In-House Counsel Data Privacy and Security Business Units External resources may include one or more of: 28 Outside counsel, to advise on legal and regulatory requirements and defense of process Consulting firm, to assist with planning and execution of workflows, sampling protocols, and validation of results Technology provider, for technology needed to index, collect, and analyze data across relevant sources

29 Action Plan Information Governance Next 7 days Consider maturity of information governance within your enterprise think strategically, focus on value propositions Next 90 days Identify starting point Assemble steering committee Set project milestones and goals Next 18 months Measure progress against milestones Measure results against goals Consider additional opportunities Stay the course 29

30 Questions? Jeffrey Sharer Sidley Austin LLP One South Dearborn Street Chicago, Illinois (312)

31 BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.

Defining and Managing Reputation Risk

Defining and Managing Reputation Risk BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Defining and Managing Reputation

More information

Acquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP

Acquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP Acquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP Agenda Introduction to Reinsurance Reinsurance in the context of an Acquisition Transaction Regulatory

More information

California Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees

California Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees APRIL 13, 2012 CALIFORNIA EMPLOYMENT & LABOR UPDATE California Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees In one of the most anticipated

More information

September Edition of Notable Cases and Events in E-Discovery

September Edition of Notable Cases and Events in E-Discovery SEPTEMBER 24, 2014 E-DISCOVERY UPDATE September Edition of Notable Cases and Events in E-Discovery This update addresses the following recent developments and court decisions involving e-discovery issues:

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL

More information

ediscovery: Trends & Challenges

ediscovery: Trends & Challenges ediscovery: Trends & Challenges Joseph P. Grasser Carrie E. Jantsch January 28, 2014 Overview Trends & Challenges Mobile Device Electronic Discovery and BYOD Policies How BYOD Policies Complicate E-Discovery

More information

Tim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing.

Tim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing. Tim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing. Outline Current legal issues relating to Cloud Computing. Context: the increasingly global technology stack. Emerging risks

More information

01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte

More information

ediscovery and Information Governance Practice Overview

ediscovery and Information Governance Practice Overview ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.

More information

FINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets

FINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets DECEMBER 9, 2015 SIDLEY UPDATE FINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets Financial Industry Regulatory Authority, Inc. (FINRA) and the Municipal

More information

Fundamentals of Information Governance:

Fundamentals of Information Governance: Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different

More information

Issues in insurance company mergers & acquisitions

Issues in insurance company mergers & acquisitions Issues in insurance company mergers & acquisitions By Perry J. Shwachman, Anthony J. Ribaudo and R. Bradley Drake, Sidley Austin LLP The completion of a successful merger or acquisition involving insurance

More information

INVESTMENT FUNDS. SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices. What Is a Family Office?

INVESTMENT FUNDS. SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices. What Is a Family Office? OCTOBER 22, 2010 INVESTMENT FUNDS SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices Section 409(a) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the

More information

2016 SIDLEY PRELAW SCHOLARS PROGRAM

2016 SIDLEY PRELAW SCHOLARS PROGRAM 2016 SIDLEY PRELAW SCHOLARS PROGRAM The Sidley Prelaw Scholars Program is designed to increase diversity in law schools and the legal profession by helping diverse, high-performing college students with

More information

Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures

Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD

More information

3 "C" Words You Need to Know: Custody - Control - Cloud

3 C Words You Need to Know: Custody - Control - Cloud 3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session

More information

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint David Tappan SharePoint Consultant C/D/H [email protected] Twitter @cdhtweetstech Don Miller Vice President of Sales Concept Searching

More information

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015 Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011

FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011 FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies October 20, 2011 On October 11, the Financial Stability Oversight Council (the Council) released

More information

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks? September 29, 2015 Practice Groups: Regulatory Compliance Internal Investigations Government Investigations White Collar Crime/Criminal Defense Public Policy and Law Environmental, Land and Natural Resources

More information

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big

More information

From Information Management to Information Governance: The New Paradigm

From Information Management to Information Governance: The New Paradigm From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp

SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp SMART ARCHIVING The need for a strategy around archiving Peter Van Camp I.R.I.S. mission I.R.I.S. mission : Increase our customers productivity and knowledge through helping them better manage their documents,

More information

Agenda. You are not in the business to manage records

Agenda. You are not in the business to manage records Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records

More information

Italian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction

Italian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction 27 August 2015 Practice Group(s): Tax Italian Tax Reform New legislation on abuse of law and statute of limitations By Vittorio Salvadori di Wiesenhoff The Italian Government has recently approved a new

More information

EMC SourceOne Email Management and ediscovery Overview

EMC SourceOne Email Management and ediscovery Overview EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email

More information

Hong Kong Enacts a Statutory Disclosure Regime

Hong Kong Enacts a Statutory Disclosure Regime Statutory Obligation for Hong Kong-Listed Corporations to Disclose Price Sensitive Information Becoming Effective on January 1, 2013 SUMMARY With effect from January 1, 2013, Hong Kong will implement a

More information

June 22, 2016. Gerald S. Sachs, Of Counsel. 2016 Paul Hastings LLP. [email protected] (202) 551-1975

June 22, 2016. Gerald S. Sachs, Of Counsel. 2016 Paul Hastings LLP. geraldsachs@paulhastings.com (202) 551-1975 Current trends and priorities of the Consumer Financial Protection Bureau (CFPB), including recent enforcement activity and its small dollar lending proposed regulation June 22, 2016 Gerald S. Sachs, Of

More information

New E-Discovery Rules: Is Your Company Prepared?

New E-Discovery Rules: Is Your Company Prepared? November 2006 New E-Discovery Rules: Is Your Company Prepared? By Maureen O Neill, Kirby Behre and Anne Nergaard On December 1, 2006, amendments to the Federal Rules of Civil Procedure ( FRCP ) concerning

More information

Miguel Ortiz, Sr. Systems Engineer. Globanet

Miguel Ortiz, Sr. Systems Engineer. Globanet Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely

More information

SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites

SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites April 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Private Equity SEC Staff Addresses Third-Party Endorsements of By Michael W. McGrath and Sonia R. Gioseffi On

More information

Information Governance

Information Governance New 2011 Report! Information Governance Fundamentals, Best Practices & Implementation Issues A Management Primer Including: Information Governance Framework Information Governance Maturity Models E-Document

More information

Payday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending

Payday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending 6 June 2016 Practice Groups: Financial Institutions and Services Litigation Consumer Financial Services Commercial Disputes Class Action Litigation Defense Payday Loans Under Attack: The CFPB's New Rule

More information

Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong

Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong June 2015 Practice Group: Investment Management, Hedge Funds and Alternative Investments Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong By Choo Lye Tan On 22 May 2015, the Securities

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

Health Care Entities Get Clarity from FCC on Telephone Communications

Health Care Entities Get Clarity from FCC on Telephone Communications 10 August 2015 Practice Group(s): Health Care Telecom, Media and Technology Health Care Entities Get Clarity from FCC on Telephone Communications By Martin L. Stern, Samuel R. Castic, Ryan J. Severson

More information

SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers. November 12, 2010

SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers. November 12, 2010 SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers November 12, 2010 The Securities and Exchange Commission (SEC) has proposed rules to implement

More information

Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015

Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 Alvarez & Marsal Global Forensic and Dispute Services 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Vietnam s Insurance Market: An Overview January 2014

Vietnam s Insurance Market: An Overview January 2014 Legal Update Insurance Vietnam 29 January 2014 Vietnam s Insurance Market: An Overview January 2014 1. Introduction Vietnam started liberalising its insurance market by allowing foreign insurers to participate

More information

SIDLEY PRELAW SCHOLARS INITIATIVE

SIDLEY PRELAW SCHOLARS INITIATIVE 2014 SIDLEY PRELAW SCHOLARS INITIATIVE The Sidley Prelaw Scholars Initiative is designed to increase diversity in law schools and within the legal profession by helping racially diverse, high-performing

More information

Real World Strategies for Migrating and Decommissioning Legacy Applications

Real World Strategies for Migrating and Decommissioning Legacy Applications Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

Registration; Amendments or Updates to Registration

Registration; Amendments or Updates to Registration FEBRUARY 7, 2011 INVESTMENT MANAGEMENT UPDATE Registered Investment Adviser Annual Reviews; Calendar of Certain 2011 Significant Dates for Advisers Investment advisers that are registered with the Securities

More information

EnCase Enterprise For Corporations

EnCase Enterprise For Corporations TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,

More information

Global Services and Capabilities

Global Services and Capabilities Global Services and Capabilities Our team of experts offers an unmatched combination of economic credentials, industry expertise, and testifying experience. GLOBAL SERVICES AND CAPABILITIES Insight in

More information

Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation

Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation Records Retention & E-Discovery Preserving Electronically Stored Information for Litigation Introduction Increasingly, data is created, sent, received, and stored electronically. In fact, 89 billion business

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t

More information

Removal of Credit Ratings References

Removal of Credit Ratings References August 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Removal of Credit Ratings References By Michael S. Caccese, Clair E. Pagnano, Rita Rubin, and George

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Client Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards

Client Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards Number 1462 February 5, 2013 Client Alert Latham & Watkins Litigation Department Accountants and Auditors as SEC Whistleblowers Nearly every public company and financial industry firm subject to the enforcement

More information

Information Governance Challenges and Solutions

Information Governance Challenges and Solutions Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information

More information

New York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Admitted in the State

New York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Admitted in the State New York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Provisions Permit Temporary Practice by Non-New York Attorneys and Registration of Non-U.S. Lawyers as In-House

More information

NAIC REINSURANCE COLLATERAL REFORM

NAIC REINSURANCE COLLATERAL REFORM NAIC REINSURANCE COLLATERAL REFORM BY CHARLENE C. McHUGH After several years of deliberation, on November 6, 2011, the National Association of Insurance Commissioners (NAIC) passed amendments to its Credit

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]

More information

Due Diligence in Regulation D Offerings

Due Diligence in Regulation D Offerings FINRA Provides Guidance on the Obligation of Broker-Dealers to Conduct Reasonable Investigations in Regulation D Offerings SUMMARY FINRA has published a regulatory notice providing guidance to broker-dealers

More information

Insights into Cloud Computing

Insights into Cloud Computing This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid

More information