Information Governance for Law Departments

Size: px
Start display at page:

Download "Information Governance for Law Departments"

Transcription

1 APPLICABLE TOWARD CPD REQUIREMENT Inaugural November 12 & 13, 2013, Toronto Information Governance for Law Departments Creating legally defensible practices in a technologically advanced world Participating organizations Aecon Group Inc. Argus Group Bell Canada Bennett Jones LLP Blake Cassels & Graydon LLP Bridgepoint Health Cambridge Group Cassels Brock & Blackwell LLP CIBC Cognition LLP Deloitte & Touche LLP Duff & Phelps Canada Limited IBIS Corporation Infusion KPMG LLP Mann Symons LLP McCarthy Tétrault LLP McMillan LLP Micrapol Associates Ltd. Milrad Law Offi ce Morneau Shepell Ltd. PrivaTech Consulting Ricoh Canada Inc. RIMtech Inc. Tangledom The Ontario Educational Communications Authority (TVO) WeirFoulds LLP Wortzman Nickle Professional Corporation Conference highlights Find out how Bell Canada and TVO are effectively dealing with information governance business issues, policies and practices Discover how the legal departments at Aecon Group and Deloitte foster an information governance culture Hear about the opportunities and risks of managing Big Data from Ricoh Canada Discover key challenges to information governance from Bridgepoint Health Find out how IBIS Corporation manages security issues Hear how to Protect Privilege, Confi dentiality and Privacy During E-Discovery from CIBC Discover issues around securing sensitive data & information from Morneau Shepell

2 Who should attend In-House Counsel, VPs & Directors in law departments, legal affairs, compliance, regulatory affairs, information technology, information management and security, CIOs; Lawyers in private practice As technology has propelled the volume and complexity of information management to new heights, corporate law departments and private law firms alike must deal with the advance of an array of issues that can threaten information privacy, security and accessibility as well as evidentiary requirements. The potential exposure points are many, and a compliant information governance strategy is essential to manage and protect critical information in order to reduce legal risks, avoid liability and control the costs of information management. The Information Management for Law Departments Conference brings together senior in-house counsel from major Canadian companies, risk management professionals and top lawyers in private practice who are successfully overseeing the implementation of information management policies and practices to protect their organizations and their clients. Join senior legal professionals from these leading Canadian organizations as they discuss how they are mitigating information management risks, avoiding liability and strengthening controls: Aecon Group Inc. Bell Canada Bridgepoint Health Cambridge Group CIBC Cognition LLP Deloitte & Touche LLP IBIS Corporation Morneau Shepell Ltd. Ricoh Canada Inc. The Ontario Educational Communications Authority (TVO) And many others Learn practical approaches for dealing with these difficult issues: Building a legally defensible information governance framework Drafting an effective & enforceable information governance policy Implementing a sound electronic records retention program Strengthening data security in the Cloud environment Improving privacy compliance practices Safeguarding information when outsourcing Improving collaboration between the law department and IT Avoiding data breaches Identifying the technology your law department needs With this level of practical experience and insight, this is one event you cannot afford to miss. Register now by calling (416) or

3 IG Strategy SESSION 1 David M.W. Young, Partner, McMillan LLP Tuesday, Nov. 12 th 9:00-9:45 CHALLENGES TO EFFECTIVE INFORMATION GOVERNANCE: A GENERAL COUNSEL PERSPECTIVE Chair: Thomas N.T. Sutton, Partner, McCarthy Tétrault LLP Anna C. Forgione, Consultant, Argus Group Kenneth H. Saul, General Counsel and Head of Compliance, Cambridge Group Ayanna Ferdinand Catlyn, General Counsel and Corporate Secretary, Bridgepoint Health As senior legal executives, managing the increasing flow of information efficiently and effectively, while staying onside of ever present compliance regulations are issues that we all must grapple with. This discussion provides an overview of the the challenges of managing information in today s modern law department. Balancing flexibility and the desire for increased mobility with maintaining appropriate information governance Creating an information governance culture Responding to the imperatives of litigation Working with the CIO Dealing with the Cloud, mobile devices, Big Data Implementing information governance within the company Gaining buy-in from the board for information governance Document management: what to collect, what to keep and what to delete 9:45-10:30 BUILDING AN INFORMATION GOVERNANCE FRAMEWORK David M.W. Young, Partner, McMillan LLP In order to meet corporate demands, improve efficiencies, reduce cost and mitigate risk, law departments & firms must improve their approach to managing information. However IM today faces an enormous challenge from the explosion in the quantities and types of electronically stored information. This session will explore how to build a legally defensible IG framework for law departments focusing on effective policies and practices. Steps to developing a legally led IG strategy Law department s role in determining information management strategies for corporation Developing a more collaborative relationship with IT Law department s input in overcoming challenges in managing the expanding quantities and types of electronically stored information Establishing effective policies and practices for achieving a legally defensible information governance program 10:30-11:00 NETWORKING BREAK 11:00-11:30 DRAFTING EFFECTIVE & ENFORCEABLE INFORMATION GOVERNANCE POLICY John B.A. Wilkinson, Partner, WeirFoulds LLP A key component of developing a high level corporate framework for an effective information governance program is the drafting of IG policy that is enforceable across all departments. This session will provide insight into effective language, enforcement strategies and benchmarks for the policy s effectiveness. Tools needed to efficiently manage and enforce your IG policy Ensuring policy evolves with new emerging technologies Incorporating updates to your policy Avoiding inconsistent implementation of your policy Using policy to promote collaboration between your IT and legal teams Strategies for keeping your policy up to date and adaptable Assessing compliance with policy: implementing ongoing monitoring 11:30-12:00 RECORD MANAGEMENT, RETENTION & DESTRUCTION BEST PRACTICES FOR IMPROVED INFORMATION GOVERNANCE Bruce Miller, President, RIMtech Inc. With rapidly changing technologies and the increasing complexity of litigation and legal retention requirements, having an effective electronic document and records management system is crucial. This session will highlight best practices for the implementation of a sound electronic records program, including a legally defensible records retention plan. Elements of a successful records retention program Implementing a successful retention program across the enterprise Best practices for identifying relevant information A strategy for destruction of non-records Achieving enterprise-wide user adoption How to avoid common implementation mistakes 12:00-12:30 INFORMATION GOVERNANCE AND INFORMATION SECURITY ISSUES: DATA BREACHES AND SECURITY Kathryn Manning, Counsel, Blake Cassels & Graydon LLP All Canadian organizations are legally responsible for ensuring that their personal information holdings are secured against unauthorized access, disclosure or other events that may give rise to potential data breaches. This session will examine effective measures that can be taken by your legal department to assist in achieving compliance with data security requirements. The legal framework: Canadian legislation and regulations, government policies and industry best practices Legal department s role in implementing and maintaining effective compliance procedures Key principles of information security Ensuring administrative, physical and technological controls are implemented and maintained Meeting compliance requirements and managing risk with data breach detection Ensuring that sharing of personal information complies with applicable laws Effective measures for the preservation and archiving of electronic documents 12:30-1:30 LUNCH

4 Increasing IG Effectiveness SESSION 2 Susan Nickle, Founder, Wortzman Nickle Professional Corporation Tuesday, Nov. 12 th 1:30-2:15 MANAGING BIG DATA RISKS AND OPPORTUNITIES Ceyda Tocsoy, National Director, Litigation Support & ediscovery, Ricoh Canada Inc. Big Data is causing in-house law departments and risk officers to pay very close attention to both the corporate risk and opportunities of this evolving area of information management. This discussion details how law departments can manage and capitalize on Big Data issues. How to tap into Big Data as evidence when it falls within the scope of a legal issue Addressing data security, privacy, compliance and ethics considerations Using Big Data to manage costs and increase efficiency within the department Moving away from siloed systems for case management toward a more integrated system 2:15-3:00 PANEL: ENSURING INFORMATION GOVERNANCE COMPLIANCE Susan Nickle, Founder, Wortzman Nickle Professional Corporation Jonathan Lau, In-House Counsel, Legal Services & Business Affairs, The Ontario Educational Communications Authority (TVO) Richard Corley, Partner, Blake, Cassels & Graydon LLP In today s data-driven world, law firms need to introduce a heightened accountability component to their record and information management function to adequately address the elevated risk levels being faced. This expert panel will provide practical advice on how to ensure information governance compliance while dealing with the business issues within their law firms. Effective law firm IG frameworks Responding to the imperatives of litigation Designing a strategic information management plan: key components and role in the process Emerging law firm records management practices Balancing flexibility and the desire for increased mobility with maintaining appropriate information governance Creating an information governance culture 3:00-3:30 NETWORKING BREAK 3:30-4:00 EFFECTIVE WORKING RELATIONSHIP BETWEEN LEGAL & IT PROFESSIONALS Pamela Fontaine-Peters, Principal, Micrapol Associates Ltd IT is not the only department struggling with the ever expanding volume of information that a corporation must deal with on a daily basis; legal departments are also feeling the strain. Legal and IT must work together to carefully consider the potential IM challenges, as well as the information security concerns that may arise. This session will look at best practices for developing an effective working relationship between legal & IT professionals. IM Incorporate the business needs of legal professionals and administrative staff into the system design Improving collaboration among IM, IT and legal professionals Overcoming obstacles to collaboration: organizational barriers to cooperation Integrated planning techniques 4:00-4:30 LITIGATION READINESS AND INFORMATION GOVERNANCE David N. Sharpe, Manager, ediscovery Services, KPMG LLP Good information governance programs reduce risks before, during and after litigation. Legal departments can provide invaluable assistance in the development of an IM strategy and help build better IM responsiveness to the risk of litigation. Litigation readiness can be a helpful way to put a tangible context around IM risks and provide guidance to addressing IM planning needs. Litigation preparedness through effective data governance Implementing litigation readiness activities: conducting records inventories, reviewing policy, creating data maps, and reviewing retention rules Role of counsel in formulating IG program for litigation preparedness Achieving accountability, transparency and auditability E-discovery s impact on IM strategy 4:30-5:00 IT PLANNING: IDENTIFYING THE TECHNOLOGY YOUR LAW DEPARTMENT NEEDS Daniel Horovitz, Senior Consultant, Deloitte LLP Kate Simpson, Knowledge & Information Architecture Consultant, Tangledom A systematic approach to technology planning will help avoid costly mistakes and will lead to the selection of the right technology to yield the most effective long-term benefits for your department. This session will look at the latest innovations in information management technology for law departments and how these tools can be used to improve information management and governance. Evolution of document review technology Integrating the latest software into your existing framework Core legal risks relating to new technologies Virtual legal departments to eliminate overhead and reduce costs Leveraging technology for litigation and compliance management Tools supporting specific legal services: using technology to enhance law department management Role of counsel in leading cross-functional teams for data privacy, data security and crisis management Implementing a long-term data management strategy with IT and

5 Managing Legal Risks SESSION 3 Lou Milrad, Principal, Milrad Law Office Wednesday, Nov. 13 th 9:00-9:45 IN-HOUSE COUNSEL PANEL: FOSTERING AN INFORMATION GOVERNANCE CULTURE Chair: Bernice Karn, Partner, Cassels Brock & Blackwell LLP George Begic, Associate General Counsel, Deloitte & Touche LLP Mark Johnson, General Counsel, Infusion Derek S. T. Baldwin, Director of Worldwide Operations and General Counsel, IBIS Corporation L. Brian Swartz, Senior Vice President, Legal and Commercial, Aecon Group Inc. Leadership from the top is critical to successful information management. This panel discussion of senior counsel from major Canadian companies details some of the key issues in establishing an information culture within the law department. How can and should good practices be identified, fostered and enforced? How much is about people processes rather than technology? Importance of senior management s support for establishing a culture that values information management How law departments have moved away from the good ole days of traditional law firm records management Evolution of law firm structures and flow of information 11:00-11:30 PRIVACY LAW ISSUES IMPACTING IG: COMPLIANCE WITH DATA SECURITY AND PRIVACY REGULATIONS Fazila Nurani, Senior Counsel and Lead Trainer, PrivaTech Consulting Constant developments in privacy and security laws are presenting business with greater challenges to ensure compliance with such laws. In order to put an effective information management program in place to avoid costly litigation and damage to corporate reputation, law departments must effectively oversee the establishment and functioning of a compliant IG plan. This session will review the law in Canada and the role of the law department in addressing these developments. Current state of privacy law: federal & provincial update Latest federal and provincial regulatory developments Ensuring compliance with data security and privacy regulations Recent case law and the latest guidelines Maintaining privacy compliance when outsourcing Addressing privacy challenges and risks associated with cloud computing Law department review of existing policies and procedures Establishing processes for data breach notification 11:30-12:00 9:45-10:30 ENSURING INFORMATION SECURITY IN THE LAW DEPARTMENT Derek S. T. Baldwin, Director of Worldwide Operations and General Counsel, IBIS Corporation Every day there are growing threats to your physical records and electronic data, making it increasingly important to implement and monitor effective security policies and technologies that mitigate risk to sensitive organizational records. This session will explore how to develop stronger security in order to protect information within the law department. Information security policies that are relevant to records management Procedural and technical security controls that implement or monitor security policies Collaborating with information security to elevate records management Strategies for managing authorized and unauthorized duplication of materials Protecting sensitive, confidential information when storing, accessing and transferring Security methods for storing and accessing sensitive documents and information Using retention schedules and status timelines 10:30-11:00 NETWORKING BREAK

6 Managing Legal Risks SESSION 3 cont d Lou Milrad, Principal, Milrad Law Offi ce Wednesday, Nov. 13 th PREDICTIVE CODING FOR INVESTIGATIONS Joseph Coltson, Managing Director, Global ediscovery & Forensic Services, Duff & Phelps Canada Limited The increasing volume and complexity of electronically stored information and the growing cost of e-discovery have created a need for development of sophisticated, high-speed processing, indexing and categorization in response to litigation and regulatory proceedings. Predictive coding, a means of separating relevant from non-relevant documents, has been one effective development, as practitioners leverage technology and new business practices to rein in e-discovery costs. Quality improvements and cost savings promised by predictive coding technology Different types of predictive coding offerings available Legal and ethical considerations in computer-assisted coding Processes needed to supplement the use of predictive coding Latest developments for the document review process Strategies, implications and challenges for predictive coding 12:00-12:30 PANEL: SECURING SENSITIVE DATA & INFORMATION Larry Swartz, Principal - Counsel, Morneau Shepell Ltd. Lisa C. Alleyne, Senior Counsel, Litigation, Bell Canada Frank Giblon, Partner, Cognition LLP The laws governing record retention and e-discovery are constantly being updated. As well there are evolving rules and regulations with respect to how information can be collected, how personally identifi able information is managed, and what happens to notifi cation requirements when information security is breached or privacy policies change. This panel will explore how law departments are dealing with information governance issues that impact risk mitigation, compliance and liability. Laws, rules and regulations: legal developments impacting information governance practices Key legal risks and requirements that impact document retention policies Implementing compliant document retention and elimination policies Auditing existing information management practices Removing information silos in the corporate framework Benchmarking program to achieve buy-in Budgeting for information management 12:30-1:30 LUNCH Audio/video segments clickable slide by slide Papers and overheads also included Print any of the material for your own use This program can be applied towards 9 of the 12 hours of annual Continuing Professional Development (CPD) required by the Law Society of Upper Canada. Please note that these CPD hours are not accredited for the New Member Requirement. For Alberta lawyers, consider including this course as a CPD learning activity in your mandatory annual Continuing Professional Development Plan as required by the Law Society of Alberta. Attendance at this course can be reported as 12 hours of Continuing Professional Development (CPD) to the Law Society of B.C. The Barreau du Québec automatically accredits training activities held outside the Province of Quebec and accredited by another Law Society which has adopted MCLE for its members

7 Protecting Privacy & Privilege SESSION 4 Lou Milrad, Principal, Milrad Law Office Wednesday, Nov. 13 th 1:30-2:15 CONVERGENCE OF EDISCOVERY AND INFORMATION GOVERNANCE: PROTECTING PRIVILEGE, CONFIDENTIALITY AND PRIVACY DURING E-DISCOVERY Laurie A. MacFarlane, Senior Counsel, Litigation, CIBC E-discovery requires proper management of an organization s digital records in order to identify, preserve, and provide information as part of the discovery process. Having a comprehensive information governance infrastructure in place is a critical component of e-discovery readiness and regulatory compliance. This presentation will provide best practices for building a successful e-records retention strategy and will look at ways to maintain privacy and data security throughout the e-discovery process. How the law of privilege impacts e-discovery practices Privacy legislation in Canada and its impact on e-discovery Processes and procedures for addressing e-discovery and information governance needs Corporate lawyer s role in the company s information governance strategy Key legal risks and requirements that impact document retention policies Confidentiality orders: common law or civil procedure rules that limit information disclosure Balancing the protection of privilege & disclosure of e-documents in litigation 2:15-3:00 LEGAL & PRIVACY CONSIDERATIONS IN OUTSOURCING Lisa K. Abe-Oldenburg, Partner, Bennett Jones LLP Companies outsource a wide variety of functions to third-party service providers, thus exposing themselves to privacy risks pertaining to shared information. This session will focus on best practices for managing privacy and security issues and safeguarding information when entering into outsourcing relationships with third parties as well as key considerations in cloud-based computing services. Legal considerations in outsourcing and cloud computing Understanding the overlapping network of federal and provincial privacy laws Ensuring privacy law compliance in outsourcing and cloud computing relationships Evaluating third party compliance: due diligence, third party audits and contractual terms Unique vulnerabilities of remote data and cross-border data flow Addressing privacy and security in outsourcing and cloud computing service agreements Managing risks when outsourcing or engaging in cloud-based computing services 3:30-4:00 ADDRESSING BUSINESS CONTINUITY: STRATEGIES TO PREPARE FOR DISASTER RECOVERY Elisabeth Symons, Partner, Mann Symons LLP In today s environment, disasters come in many unexpected forms. Having an effective business continuity and disaster recovery plan as part of your overall information management program is essential in order to mitigate damages and loss in the event of a disaster. This session will look at the legal department s role in ensuring business continuity in your legal department. Essential components of a disaster recovery plan to mitigate damage Disaster risk management strategies for data protection Establishing informational priorities: key policies and controls Assessing legal risks for failure to recover documents in the event of a disaster 4:00-5:00 MASTER CLASS: LAW DEPARTMENT CHALLENGES CREATED BY BYOD AND SOCIAL MEDIA: DEVELOPING GOVERNANCE STRATEGY TO MANAGE SOCIAL MEDIA LEGAL RISKS Lou Milrad, Principal, Milrad Law Office BYOD and social media have created challenges for law departments, as they are struggling with what limits they can place on employees use of social media and, when disputes arise, the discoverability and evidentiary value of social media entries. Similar issues arise with respect to the use by today s mobile workforce of personal devices for company work. This session will examine how your legal team can develop an effective legal risk mitigation strategy to effectively manage information in social media environment. Identifying legal risks and issues that social media tools and mobile technology present Legal department s role in developing effective policy Ensuring social media governance strategy is aligned with the existing policies and standards of the organization Recent developments in the area of privacy impacting social media Emerging issues on breaches of privacy and confidentiality Risks of misuse of corporate data shared online Information governance implications for BYOD E-discovery risks with BYOD 3:00-3:30 NETWORKING BREAK

8 APPLICABLE TOWARD CPD REQUIREMENT Inaugural November 12 & 13, 2013, Toronto Information Governance for Law Departments Creating legally defensible practices in a technologically advanced world COURTYARD BY MARRIOTT DOWNTOWN TORONTO 475 YONGE STREET TORONTO, ON M4Y 1X7 To register for Delegate Name Delegate Title Approving Manager Name Approving Manager Title Department Organization Address City Province Postal Code Telephone ext Fax Cheque enclosed (payable to Federated Press) for: REGISTRATION COSTS GST Registration # R Please bill my credit card: AMEX VISA Mastercard Credit Card # Signature: Information Governance for Law Departments Book & Pay by Aug. 12/13 $ Book & Pay by Sept. 12/13 Expiration date: / Regular Price Mail completed form with payment to: Federated Press P.O. Box 4005, Station A Toronto, Ontario M5W 2Z8 UNCONDITIONAL UPGRADE POLICY If you have registered for a similar or simultaneous event and wish to attend this Federated Press event instead, we are so sure that you will fi nd this conference of more value that we will refund any cancellation fee up to $ GROUP DISCOUNT If you register four people at the same time you will be entitled to a discount. To take advantage of this special offer, payment for all delegates must be made with one cheque or credit card charge. Contact Sandra Frattolillo at: ext. 223 for more information Toronto: (416) info@federatedpress.com (416) Conference + CD-ROM ($150) $ 1925 $ 2025 $ 2125 Conference $ 1775 $ 1875 $ 1975 CD-ROM only $ 499 * Breakfasts, luncheons, morning and afternoon coffee breaks are included in the registration fees. Please add 13% HST to all prices. / PBN# PG0001 CD-ROM: The modern way to benefit from leading-edge conference information. Weren t able to attend this Federated Press conference? Though you cannot replace the experience of attending, you can benefi t from the leading-edge information provided at the conferences, including all the written materials and video presentations by purchasing the Proceeding CD ROM. Our conference CD-ROMs create the experience of actually being at a lecture or conference. Cancellation: Please note that non-attendance at the conference does not entitle the registrant to a refund. In the event that a registrant becomes unable to attend following the deadline for cancellation, a substitute attendee may be delegated. A copy of the conference papers will be provided in any case. Please notify Federated Press of any changes as soon as possible. Federated Press assumes no liability for changes in program content or speakers. A full refund of the attendance fee will be provided upon cancellation in writing received prior to Oct. 30, No refunds will be issued after this date. Payment must be received prior to Nov. 5, 2013 WHEN CALLING, PLEASE MENTION PRIORITY CODE: IGLD1311/E

The 4 th Annual Commercial Litigation Conference

The 4 th Annual Commercial Litigation Conference LexisNexis Conference Series The 4 th Annual Commercial Litigation Conference Recent Developments and Best Practices for the Legal and Accounting Professions Thursday, April 3, 2008 The Grand Hotel Toronto,

More information

The Osgoode Certificate in ediscovery, Records Management, Information Governance and Privacy

The Osgoode Certificate in ediscovery, Records Management, Information Governance and Privacy Attend this comprehensive and practical program and build your ediscovery skills while earning your full annual CPD credit The Osgoode Certificate in ediscovery, Records Management, Information Governance

More information

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,

More information

FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE

FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE FULLY ACCREDITED IN-CLASS PROGRAM & LIVE WEBINAR Toronto, June 9 Webinar, June 9 REGISTER BEFORE MAY 13 AND SAVE OVER $300 FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE FINANCE THREATS REGULATORY

More information

MANAGING THE LEGAL AND BUSINESS RISKS OF SOCIAL MEDIA 2014

MANAGING THE LEGAL AND BUSINESS RISKS OF SOCIAL MEDIA 2014 OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series MANAGING THE LEGAL AND BUSINESS RISKS OF SOCIAL MEDIA 2014 7 focused webinars will cover the latest legal developments and give you practical

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

CANADIAN SECURITIES LAW AND PRACTICE

CANADIAN SECURITIES LAW AND PRACTICE OSGOODE PROFESSIONAL DEVELOPMENT The Intensive Course in CANADIAN SECURITIES LAW AND PRACTICE This intensive course, from the developers of the Professional LLM in Securities Law, will give you a comprehensive,

More information

Advertising & Marketing Law & Compliance

Advertising & Marketing Law & Compliance April 29 30, 2010 Marriott Bloor Yorkville, Toronto The Canadian Institute s forum on Advertising & Marketing Law & Compliance for FINANCIAL INSTITUTIONS Best Practices for Minimizing Risk While Maximizing

More information

Strategic Supply Chain Certificate Program

Strategic Supply Chain Certificate Program Strategic Supply Chain Certificate Program Introduction For most businesses the predominance of costs are initiated and managed by or through supply chain management. Operating often in silos, supply chain

More information

The Intensive Short Course in Canadian Securities Law and Practice

The Intensive Short Course in Canadian Securities Law and Practice Great presentations. A great experience with practical advice. (2007) The Intensive Short Course in Canadian Securities Law and Practice This comprehensive course, from the developers of the Part-time

More information

3RD ANNUAL CANADIAN CONSTRUCTION INSURANCE LAW: NEW WAYS TO MANAGE RISK AND AVOID LIABILITY

3RD ANNUAL CANADIAN CONSTRUCTION INSURANCE LAW: NEW WAYS TO MANAGE RISK AND AVOID LIABILITY 3RD ANNUAL CANADIAN CONSTRUCTION INSURANCE LAW: Construction projects and insurance policies go hand-in-hand. But it s important to know what s insurable, what s not, and what to look for in purchasing

More information

NOT-FOR-PROFIT AND CHARITY FINANCE LEADERSHIP CERTIFICATE

NOT-FOR-PROFIT AND CHARITY FINANCE LEADERSHIP CERTIFICATE NOT-FOR-PROFIT AND CHARITY FINANCE LEADERSHIP CERTIFICATE Achieving sustainability, providing quality programs, managing funding requirements and changing legal and accounting standards are challenging

More information

Optimizing Accounts Payable Functions

Optimizing Accounts Payable Functions 9th Optimizing Accounts Payable Functions Leading strategies for reducing costs and improving the performance of Accounts Payable Functions March 26, 27 & 28, 2012, Toronto Participating organizations

More information

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS Wednesday, June 25, 2014 Georgetown University Law Center Washington, DC CLE 7.0 CLE credit hours (based on a 60-minute credit hour) including 1.0 ethics

More information

PRE-TENDER STAGES MANAGING RISK AT THE OF YOUR CONSTRUCTION PROJECT. June 24-25, 2009 Hyatt Regency Calgary Calgary

PRE-TENDER STAGES MANAGING RISK AT THE OF YOUR CONSTRUCTION PROJECT. June 24-25, 2009 Hyatt Regency Calgary Calgary June 24-25, 2009 Hyatt Regency Calgary Calgary The Canadian Institute s Conference on MANAGING RISK AT THE PRE-TENDER STAGES OF YOUR CONSTRUCTION PROJECT PRACTICAL TIPS AND TOOLS FOR RISK MANAGEMENT Co-Chairs:

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Document Management and Retention Policies for Clients and Law Firms

Document Management and Retention Policies for Clients and Law Firms The Chicago Bar Association & Chicago-Kent College of Law Present Document Management and Retention Policies for Clients and Law Firms A unique full-day seminar for all attorneys, but especially for those

More information

Privacy and Security Framework, February 2010

Privacy and Security Framework, February 2010 Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

Human Resources Management for Aboriginal and Northern Communities

Human Resources Management for Aboriginal and Northern Communities Explore practical approaches to meeting your human resources objectives. Human Resources Management for Aboriginal and Northern Communities January 19, 20 and 21, 2016 Yellowknife, NT YOur Faculty Hear

More information

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSOR SILVER SPONSOR BRONZE SPONSOR SUPPORTING ORGANISATION SUPPORTING ASSOCIATION ABOUT

More information

FIFTH ANNUAL SOCIAL MEDIA LAW CONFERENCE CUTTING EDGE PRACTICAL ADVICE FROM CANADA S ADVERTISING LAW EXPERTS

FIFTH ANNUAL SOCIAL MEDIA LAW CONFERENCE CUTTING EDGE PRACTICAL ADVICE FROM CANADA S ADVERTISING LAW EXPERTS FIFTH ANNUAL SOCIAL MEDIA LAW CONFERENCE CUTTING EDGE PRACTICAL ADVICE FROM CANADA S ADVERTISING LAW EXPERTS The digital and social age demands immediate action and reaction. More than ever before, legal

More information

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August

More information

Optimizing Accounts Payable Functions. Leading strategies for reducing costs and improving the performance of Accounts Payable Functions

Optimizing Accounts Payable Functions. Leading strategies for reducing costs and improving the performance of Accounts Payable Functions Opportunity to see reallife examples of company processes and appreciate range of practices, concerns and solutions. Reinforced items on what should be the A/P roadmap in order to make changes. The networking

More information

Construction Liens in Ontario

Construction Liens in Ontario Construction Liens in Ontario Neil S. Abbott Gowling Lafleur Henderson LLP Jeffrey A. Armel Goldman Sloan Nash & Haber LLP Joseph Cosentino Goodmans LLP Robert J. Kennaley McLauchlin & Associates Jennifer

More information

From Information Management to Information Governance: The New Paradigm

From Information Management to Information Governance: The New Paradigm From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining

More information

DATA BREACH RESPONSE READINESS Is Your Organization Prepared?

DATA BREACH RESPONSE READINESS Is Your Organization Prepared? March 30, 2015 DATA BREACH RESPONSE READINESS Is Your Organization Prepared? Peter Sloan Pete Enko Jeff Jensen Deborah Juhnke The data security imperatives of Prevention, Detection, and Response do not

More information

ABORIGINAL OIL AND GAS FORUM

ABORIGINAL OIL AND GAS FORUM Presented by Insight Information 7th Annual ABORIGINAL OIL AND GAS FORUM April 28 29, 2008 Shaw Conference Centre Edmonton Why you need to attend this year s forum: Understand Aboriginal consultation guidelines

More information

The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness

The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness This comprehensive survey report reveals how many organizations are still grappling with being prepared

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

RESTRUCTURING SOLICITORS FIRMS IN FINANCIAL DISTRESS

RESTRUCTURING SOLICITORS FIRMS IN FINANCIAL DISTRESS IAL DISTRESS RESTRUCTURING OPTIONS PARTNERSHIP ISSUES WARNING SIG S PARTNERSHIP ISSUES WARNING SIGNS FINANCIAL DISTRESS RESTRUCTUR FINANCIAL DISTRESS RESTRUCTURING OPTIONS PARTNERSHIP ISSUES WARN Course

More information

EMPLOYEES IN INSOLVENCY A LEGAL AND PRACTICAL GUIDE

EMPLOYEES IN INSOLVENCY A LEGAL AND PRACTICAL GUIDE The Voice of Business Recovery MPLOYMENT LAW REDUNDANCIES TUPE CLAIMS CONSULTATION EMPLOYMENT LAW REDUNDANCIES TUPE CLAI ONSULTATION EMPLOYMENT LAW REDUNDANCIES TUPE CLAIMS CONSULTATION EMPLOYMENT LAW

More information

E-discovery The Basics: From Proportionality to Technology Assisted Review

E-discovery The Basics: From Proportionality to Technology Assisted Review MATERIALS / MATÉRIAUX 2012 Competition Law Fall Conference Conférence annuelle d'automne 2012 en droit de la concurrence E-discovery The Basics: From Proportionality to Technology Assisted Review Susan

More information

MANAGING CYBERSECURITY RISK 2015

MANAGING CYBERSECURITY RISK 2015 MANAGING CYBERSECURITY RISK 2015 Cybersecurity has become an ubiquitous business risk, extending beyond IT and security professionals to the C-suite and the boardroom. In the last year, virtually no industry

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data International Association for the Management of Digital Analytics Standards, Training and Certification for Digital Analytics Management Managed Analytic Services Inc. Data Analysis Expertise Insight Value

More information

Employee Surveillance and the Law

Employee Surveillance and the Law One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace Supported by 4 November 2015 Central London Book online at www.regonline.com/employeesurveillance

More information

Business Improvement in Universities

Business Improvement in Universities Business Improvement in Universities Transforming back-of-house functions to maximise efficiency gains 24th & 25th September, 2014, Rydges Melbourne Key Speakers Benefits of attending Peter Marshall Chief

More information

ARMA: Information Governance: A Revenue Source Potential

ARMA: Information Governance: A Revenue Source Potential ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally

More information

Obtaining, Producing and Presenting Electronic Evidence

Obtaining, Producing and Presenting Electronic Evidence Excellent blending of the legal issues with the technological aspects Lori Patyk, Ministry of the Attorney General, Finance and Revenue, Legal Services The Osgoode Short Course in Obtaining, Producing

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

8 TH ANNUAL ADVERTISING AND MARKETING LAW: LESS IS THE NEW MORE

8 TH ANNUAL ADVERTISING AND MARKETING LAW: LESS IS THE NEW MORE 8 TH ANNUAL ADVERTISING AND MARKETING LAW: LESS IS THE NEW MORE Advertisers today seem to have less of everything yet are expected to do more than ever before. Less words (or characters), less money, less

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005 Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005

More information

Privacy by Design Setting a new standard for privacy certification

Privacy by Design Setting a new standard for privacy certification Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,

More information

Signing the Contract - Contracture of People Managers

Signing the Contract - Contracture of People Managers CERTIFICATION APPLICATION FOR AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM This form is reserved for agencies and brokers acting on their own account and for designers of EDM systems for those agencies and

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Soo Y Kang, IGP, CIPP/US General Counsel / Director, Consulting Division Zasio Enterprises, Inc. March 2015 June 2015 Article

More information

Event Guide. September 30, 2013. 8 am to 4 pm Twenty Toronto Street Conferences and Events 20 Toronto Street, 2nd fl.

Event Guide. September 30, 2013. 8 am to 4 pm Twenty Toronto Street Conferences and Events 20 Toronto Street, 2nd fl. Bringing the latest technology solutions to the legal profession Discover top emerging trends in legal technology Learn how to maximize your productivity with the best software solutions Find out how to

More information

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both

More information

MISSION VALUES. The guide has been printed by:

MISSION VALUES. The guide has been printed by: www.cudgc.sk.ca MISSION We instill public confidence in Saskatchewan credit unions by guaranteeing deposits. As the primary prudential and solvency regulator, we promote responsible governance by credit

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President

More information

CANADIAN SECURITIES LAW AND PRACTICE

CANADIAN SECURITIES LAW AND PRACTICE OSGOODE PROFESSIONAL DEVELOPMENT The Intensive Course in CANADIAN SECURITIES LAW AND PRACTICE Over four evenings, expert instructors will provide you with a solid understanding of the legal framework,

More information

Leadership Succession Management

Leadership Succession Management 17th Leadership Succession Management Driving corporate results through effective leadership succession planning and talent management February 6, 7 & 8, 2012, Toronto Participating organizations BMO HARRIS

More information

Information Governance in the Cloud

Information Governance in the Cloud Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and

More information

Index All entries in the index reference page numbers.

Index All entries in the index reference page numbers. Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

Overcoming the challenges to growth for broker-dealers

Overcoming the challenges to growth for broker-dealers Overcoming the challenges to growth for broker-dealers The months ahead will be a challenging time for the financial services sector, and broker-dealers face significant uncertainty. A broad spectrum of

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information: Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

Cloud Service Contracts: An Issue of Trust

Cloud Service Contracts: An Issue of Trust Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

Email Archiving: Common Myths and Misconceptions

Email Archiving: Common Myths and Misconceptions White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504 www.messageone.com Introduction From the executive

More information

TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT. Key Concepts Defined. Key Concepts Defined 4/30/2015

TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT. Key Concepts Defined. Key Concepts Defined 4/30/2015 TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT William Saffady (718) 246-4696 wsaffady@aol.com Key Concepts Defined Governance the process or system by which an organization s

More information

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red

More information

Royal Air Force Club

Royal Air Force Club 11 th Annual Legal Day Friday, 22 nd January, 2010 This will once again be held at the Royal Air Force Club Piccadilly, London. This year, there is no specific theme for the seminar. Rather, the ISSG has

More information

CIVIL SEXUAL ASSAULT CLAIMS

CIVIL SEXUAL ASSAULT CLAIMS OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series THE GUIDE TO BRINGING/DEFENDING CIVIL SEXUAL ASSAULT CLAIMS 7 webinars that will equip you with up-to-date information and best practices for

More information

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents 2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...

More information

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Service Alberta BUSINESS PLAN 2010 13

Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010-13 ACCOUNTABILITY STATEMENT The business plan for the three years commencing April 1, 2010 was prepared under my direction in accordance

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com Regulatory update Economic capital Risk appetite ALM optimization Risk management and strategy in a low rates environment insurancerisknorthamerica.com Inaugural Insurance Risk North America conference

More information

CAPDM Mobile Event App. App Updates Soon

CAPDM Mobile Event App. App Updates Soon Mobile Event App App Updates Soon Conference at-a-glance Strengthening relationships and showcasing capabilities to advance your business are key features of the CAPDM Executive Conference. Exclusive business

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Technology Implementation for Law Firms and General Counsel Offices

Technology Implementation for Law Firms and General Counsel Offices Technology Implementation for Law Firms and General Counsel Offices Robin Snasdell¹ Managing Director Huron Legal Original Source: McGarry, S.J., ed., Leaders in Legal Business (HG.org 2015) To view this

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

Governance Takes A Central Role As Enterprises Shift To Mobile

Governance Takes A Central Role As Enterprises Shift To Mobile A Forrester Consulting Thought Leadership Paper Commissioned By Druva October 2014 Governance Takes A Central Role As Enterprises Shift To Mobile Table Of Contents Executive Summary... 1 Mobility Adds

More information

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona Information Governance Define your Process and Framework Agenda Information Governance Defined

More information

HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply

HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply October 18, 2013 ACEDS Membership Benefits Training, Resources and Networking for the ediscovery Community Exclusive News and

More information

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement Clinton Mikel The Health Law Partners, P.C. Alessandra Swanson U.S. Department of Health and Human Services - Office for Civil Rights Disclosure

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD 8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered

More information

The Manitoba Child Care Association PRIVACY POLICY

The Manitoba Child Care Association PRIVACY POLICY The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information

More information

IDENTIFYING AND RESPONDING TO DATA BREACHES

IDENTIFYING AND RESPONDING TO DATA BREACHES IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information