Technology Assisted Review Goes Left: Predictive Analytics In Information Governance
|
|
- Robyn Harmon
- 8 years ago
- Views:
Transcription
1 BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.
2 Agenda I. Why Are We Here? II. What Is Predictive Analytics? III.Modernizing Information Governance A. Modernizing Records Retention B. Information Classification C. Defensible Deletion IV.Moving Forward 2
3 Why Are We Here? Gartner predicts that, by 2017, 33 percent of Fortune 100 organizations will experience an information crisis, due to their inability to effectively value, govern and trust their enterprise information. Press Release, Gartner, Inc., Gartner Says One-Third of Fortune 100 Organizations Will Face an Information Crisis by 2017 (Feb. 27, 2014)
4 Consequences of Increased Data Volumes Increased IT infrastructure costs 78% Cannot find information when needed 73% Increased regulatory compliance risk 67% Increased e-discovery costs 59% Need to recreate information previously created Increased risk of data leakage Increased complexity of protecting intellectual property or trade secrets 41% 49% 47% No serious consequences 2% Source: Council for Information Auto-Classification, The Information Explosion: How Organizations are Dealing With It (Oct 2011) (available at 4
5 Litigation and Regulatory Risks Risk of sanctions for failures to identify, preserve, or collect relevant data Risk of missed deadlines and sanctions resulting from inability to respond timely and effectively to discovery requests Risk that cost-prohibitive e- discovery influences settlement dynamic Risk of cross-border conflicts between U.S. discovery obligations and foreign privacy laws 5
6 Data Privacy and Security Risks Risks of violating data privacy laws, for example: 6 Improper (unsecure) handling of protected information, such as social security numbers, financial accounts, etc. Data leakage to locations outside company s environment (e.g., personal devices, Dropbox, Google) Retention of information past required destruction (e.g., upon expiration of purpose) Inadvertently transferring protected data out of jurisdiction Risk of losing protected or sensitive information in data breach, potentially resulting in notification obligations, regulatory or civil exposure, damage to reputation, and other harm to company Risk of audit failures (internal or external) exposed to customers, clients, or regulators, or publicly through discovery in litigation
7 Data Security Challenges Safeguarding data and protecting information security systems is increasingly complicated International consumer base accessing sites online Cloud computing / third-party service providers The human component Persistent, coordinated cyberattacks Corporations face significant risks: Loss of intellectual property and operational disruption Customer litigation, regulatory enforcement, or shareholder lawsuits 7
8 Compliance Risks Accelerating global regulations FCPA, Dodd-Frank, GLBA, SOX, Basel III, AML, ABC, PCI, etc. Compliance violations more difficult to detect where offending data obscured by millions of other grains of sand Noise created by debris hinders performance of predictive analytics and other tools and processes that otherwise might detect violations Less sensitive data potentially to land in insecure storage
9 Risks In Dark Data o o o o Risk of legal liabilities, compliance violations, smoking guns, and other unpleasant surprises lurking in dark data Clogged systems can obscure legal liabilities and compliance issues and make identification difficult even upon search and inquiry Unknown liabilities may be identified, or known liabilities may increase in severity, through due diligence in connection with business transactions or other sensitive negotiations Expired data produced in litigation or regulatory proceedings can trigger additional lawsuits or investigations 9
10 The Internet of Things Digitization of the Physical World: Physical objects are equipped with unique identifiers that can be digitally tracked RFID tags used to identify and inventory objects (and by proxy, people) Smartphone control: sensors embedded in object send data to smartphone, informing user s actions Currently focused on home systems and appliances (home security, smart appliances, thermostats)
11 And The Challenges Are Not Going Away 50-fold growth in the digital universe from the beginning of 2010 through the end of Zettabytes in 2020 will be equivalent of: 57 times the amount of all of the grains of sand on all the beaches on earth Saved on Blu-ray discs, without sleeves or cases, would weigh as much as 424 Nimitz-class aircraft carriers 5,247 GB of data for every person in the world And the Internet of Things (Exabytes) ,000 35,000 30,000 25,000 20,000 15,000 10,000 5, Source: IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East (Dec. 2012)
12 12 What Is Predictive Analytics?
13 What Is Predictive Analytics?
14 Predictive Analytics Is Everywhere
15 15 The Electronic Discovery Reference Model
16 16 The Electronic Discovery Reference Model
17 Predictive Analytics In IG Leverages technology to backstop humans Even low tech auto-classification can be very effective at identifying certain sensitive information types Policy rule engines Word indexes and metadata Complex and challenging to maintain Difficult to scale Machine learning tools
18 Classification Through Machine Learning Applying lessons learned in e-discovery, earlier in information lifecycle Growing body of research showing computer-assisted classification to be as or more effective than human classification Question is not whether any approach is perfect; question is whether it s more effective than alternatives Solid acceptance by courts and regulators in litigation and enforcement contexts Effective for early warning systems Not an easy button requires significant up-front work and ongoing maintenance, but potential to be more effective and efficient over long run
19 How Does Auto-Classification Work? Training Classification Validation Application Humans teach machine classification from sample documents Machine applies learning to other documents and classifies them Humans QC machine output and provide further training if needed Machine classification becomes one aspect of overall IG process 19
20 20 Modernizing Information Governance
21 Modernizing Information Governance Looking forward, looking back Leveraging technology to break down traditional information silos Key issues to address: Types of records Variety of storage media Regulatory sprawl Data protection laws International considerations Accessibility to end users Legacy data stores
22 Looking Forward Active and newly created records Integration of IG, business, legal, and compliance Potential compliance functions: Enhancing security of sensitive data Segregation Access controls by user, content type, or other criteria specific to individual records Anonymization, redaction, and expungement Surveillance and early warning systems Automated legal holds, disposition upon expiration, and other handling
23 Automating Information Governance Tired but true: People, process, and technology. Identifying and capturing records Classification through content templates Classification through user-selected folders Hybrid classification: User-based but analytics provides defaults, performs QC, etc. Machine-based: Analytics-based using rules and algorithms to identify and classify records Data security Machine-powered security classification, redaction and/or expungement
24 Further Applications Managing records Assign retention periods based on machine classification Ability to manage-in-place, and know what s being managed Accessing records Search on steroids using text- and concept-based search Automated disposition according to retention schedule Used properly, powerful means of driving compliance Process requires necessary checks and approvals
25 Looking Back Classification of existing records Identify and secure sensitive information already dispersed throughout organization Remediation of expired data, a/k/a, defensible deletion Reduce unnecessary retention Reduce storage and litigation costs Reduce legal and compliance risks Create business value
26 Benefits of Defensible Data Reduction Reduce legal and compliance risks Data privacy and security Elimination of dark data mitigates surprise smoking guns Organization knows what it has and what its risks are Save money Hard and soft costs associated with data storage and maintenance E-discovery and regulatory response Create business value Operating efficiencies, e.g., IT staffing and infrastructure Employees better able to find information when needed Business better able to extract value from data that remains 26
27 27 Moving Forward
28 It Takes A Village Internal several stakeholders, including: Records Management Information Technology In-House Counsel Data Privacy and Security Business Units External resources may include one or more of: 28 Outside counsel, to advise on legal and regulatory requirements and defense of process Consulting firm, to assist with planning and execution of workflows, sampling protocols, and validation of results Technology provider, for technology needed to index, collect, and analyze data across relevant sources
29 Action Plan Information Governance Next 7 days Consider maturity of information governance within your enterprise think strategically, focus on value propositions Next 90 days Identify starting point Assemble steering committee Set project milestones and goals Next 18 months Measure progress against milestones Measure results against goals Consider additional opportunities Stay the course 29
30 Questions? Jeffrey Sharer Sidley Austin LLP One South Dearborn Street Chicago, Illinois (312)
31 BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.
Defining and Managing Reputation Risk
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Defining and Managing Reputation
More informationAcquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP
Acquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP Agenda Introduction to Reinsurance Reinsurance in the context of an Acquisition Transaction Regulatory
More informationCybersecurity: What In-House Counsel Needs to Know
Cybersecurity: What In-House Counsel Needs to Know November 19, 2013 Vivian A. Maese vivian.maese@dechert.com 2013 Dechert LLP So what does all of the legal activity in cybersecurity mean to you? The top
More informationCalifornia Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees
APRIL 13, 2012 CALIFORNIA EMPLOYMENT & LABOR UPDATE California Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees In one of the most anticipated
More informationSeptember Edition of Notable Cases and Events in E-Discovery
SEPTEMBER 24, 2014 E-DISCOVERY UPDATE September Edition of Notable Cases and Events in E-Discovery This update addresses the following recent developments and court decisions involving e-discovery issues:
More informationediscovery: Managing Costs & Avoiding Pitfalls
ediscovery: Managing Costs & Avoiding Pitfalls Presented by: Joseph P. Grasser joseph.grasser@squiresanders.com Carrie E. Jantsch carrie.jantsch@squiresanders.com 2 Overview Managing Costs How to Address
More informationCloud Computing: Business Benefits, Legal Uncertainties, Risks and Strategies
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Cloud Computing: Business Benefits, Legal
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationDirector, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
More informationCloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL
More informationediscovery: Trends & Challenges
ediscovery: Trends & Challenges Joseph P. Grasser Carrie E. Jantsch January 28, 2014 Overview Trends & Challenges Mobile Device Electronic Discovery and BYOD Policies How BYOD Policies Complicate E-Discovery
More informationTim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing.
Tim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing. Outline Current legal issues relating to Cloud Computing. Context: the increasingly global technology stack. Emerging risks
More information01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte
More informationediscovery and Information Governance Practice Overview
ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.
More informationFINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets
DECEMBER 9, 2015 SIDLEY UPDATE FINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets Financial Industry Regulatory Authority, Inc. (FINRA) and the Municipal
More informationInformation Governance in the Cloud
Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and
More informationUK OFT Investigation into Health Markets
MARCH 23, 2011 EU LIFE SCIENCES UPDATE UK OFT Investigation into Health Markets Executive Summary On 10 March 2011, the Office of Fair Trading (OFT) formally launched a market study into private healthcare.
More informationGovernment Dimensions of Cloud Computing
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Government Dimensions of Cloud Computing
More informationFundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
More informationFTA Releases Final Report on Consumer Privacy
APRIL 3, 2012 PRIVACY, DATA SECURITY & INFORMATION LAW UPDATE FTC Releases Final Report on Consumer Privacy: Calls for Enhanced Practices and Further Congressional Action On March 26, 2012, the Federal
More informationMeaning Based Computing: Managing the Avalanche of Unstructured Data
Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information
More informationACCOUNTANTS LIABILITY UPDATE
JULY 14, 2010 ACCOUNTANTS LIABILITY UPDATE Accountants Liability Practice With highly skilled and experienced lawyers in Chicago, Los Angeles, New York, San Francisco and Washington, D.C., we are able
More informationIssues in insurance company mergers & acquisitions
Issues in insurance company mergers & acquisitions By Perry J. Shwachman, Anthony J. Ribaudo and R. Bradley Drake, Sidley Austin LLP The completion of a successful merger or acquisition involving insurance
More informationFINANCIAL INSTITUTIONS REGULATORY UPDATE
OCTOBER 19, 2009 FINANCIAL INSTITUTIONS REGULATORY UPDATE The Financial Institutions Regulatory Practice Group of Sidley Austin LLP The Financial Institutions Regulatory Practice group offers counseling,
More informationKilling Two Birds With One Stone: Optimizing Information Governance for Easier E- Discovery
Killing Two Birds With One Stone: Optimizing Information Governance for Easier E- Discovery 1 Agenda Presenters The relationship between information governance and e-discovery Sanctions and case law Corporate
More informationINVESTMENT FUNDS. SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices. What Is a Family Office?
OCTOBER 22, 2010 INVESTMENT FUNDS SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices Section 409(a) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the
More information2016 SIDLEY PRELAW SCHOLARS PROGRAM
2016 SIDLEY PRELAW SCHOLARS PROGRAM The Sidley Prelaw Scholars Program is designed to increase diversity in law schools and the legal profession by helping diverse, high-performing college students with
More informationInformation Governance: How to Assess Your Status
Information Governance: How to Assess Your Status Jay Yelton, III and Mark Oudersluys December 3, 2015 WNJ.com Agenda What is Information Governance? Why is IG Increasingly Important? Strategic Focus:
More informationBackground. 9 September 2015. Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Finance
9 September 2015 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Finance Cybersecurity Update: National Futures Association Proposes Cybersecurity Guidance
More informationEnvironment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures
Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationReduce Cost, Time, and Risk ediscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint David Tappan SharePoint Consultant C/D/H davidt@cdh.com Twitter @cdhtweetstech Don Miller Vice President of Sales Concept Searching
More informationBreaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
More informationHow To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationFSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011
FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies October 20, 2011 On October 11, the Financial Stability Oversight Council (the Council) released
More informationHow Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?
September 29, 2015 Practice Groups: Regulatory Compliance Internal Investigations Government Investigations White Collar Crime/Criminal Defense Public Policy and Law Environmental, Land and Natural Resources
More informationIBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk
Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big
More informationFebruary Edition of Notable Cases and Events in E-Discovery
FEBRUARY 12, 2015 E-DISCOVERY UPDATE February Edition of Notable Cases and Events in E-Discovery The January 2015 Case Notes discuss the following: 1. A Nebraska federal court decision citing the proportionality
More informationLitigation & Corporate Compliance Survey
Litigation & Corporate Compliance Survey July 2013 www.alixpartners.com Disclaimer Important Information Regarding This Report This report was prepared by AlixPartners LLP ( AlixPartners ) for general
More informationFrom Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
More informationCredit Default Swaps Insurance or Not? What is a Credit Default Swap? History of CDS. CDS market started in early 1990s
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Credit Default Swaps Insurance or Not? Casualty
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationInformation Governance
Information Governance The New Records Management Rudy Moliere Director, Information Goverance & Records Management Terrence J. Coan, CRM Senior Director Information Management Practice Agenda Introductions
More informationAdopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
More informationSMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp
SMART ARCHIVING The need for a strategy around archiving Peter Van Camp I.R.I.S. mission I.R.I.S. mission : Increase our customers productivity and knowledge through helping them better manage their documents,
More informationAgenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
More informationThe Importance of Privacy & Data Security in a Changing World
Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but
More informationItalian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction
27 August 2015 Practice Group(s): Tax Italian Tax Reform New legislation on abuse of law and statute of limitations By Vittorio Salvadori di Wiesenhoff The Italian Government has recently approved a new
More informationEMC SourceOne Email Management and ediscovery Overview
EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email
More informationPredictive Coding and The Return on Investment (ROI) of Advanced Review Strategies in ediscovery
Predictive Coding and The Return on Investment (ROI) of Advanced Review Strategies in ediscovery Drew Lewis ediscovery Counsel AGENDA A Predictive Coding Primer Predictive Coding and Market Trends Predictive
More informationESI and Predictive Coding
Beijing Boston Brussels Chicago Frankfurt Hong Kong ESI and Predictive Coding Houston London Los Angeles Moscow Munich New York Palo Alto Paris São Paulo Charles W. Schwartz Chris Wycliff December 13,
More informationHong Kong Enacts a Statutory Disclosure Regime
Statutory Obligation for Hong Kong-Listed Corporations to Disclose Price Sensitive Information Becoming Effective on January 1, 2013 SUMMARY With effect from January 1, 2013, Hong Kong will implement a
More informationJune 22, 2016. Gerald S. Sachs, Of Counsel. 2016 Paul Hastings LLP. geraldsachs@paulhastings.com (202) 551-1975
Current trends and priorities of the Consumer Financial Protection Bureau (CFPB), including recent enforcement activity and its small dollar lending proposed regulation June 22, 2016 Gerald S. Sachs, Of
More informationNew E-Discovery Rules: Is Your Company Prepared?
November 2006 New E-Discovery Rules: Is Your Company Prepared? By Maureen O Neill, Kirby Behre and Anne Nergaard On December 1, 2006, amendments to the Federal Rules of Civil Procedure ( FRCP ) concerning
More informationMiguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
More informationSEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites
April 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Private Equity SEC Staff Addresses Third-Party Endorsements of By Michael W. McGrath and Sonia R. Gioseffi On
More informationInformation Governance
New 2011 Report! Information Governance Fundamentals, Best Practices & Implementation Issues A Management Primer Including: Information Governance Framework Information Governance Maturity Models E-Document
More informationSweeping Changes Made to Labor and Employment Whistleblower Protections
Sweeping Changes Made to Labor and Employment Whistleblower Protections Financial reform legislation, if signed, will among other changes allow employee whistleblowers to bypass Sarbanes-Oxley administrative
More informationGovernance from the Cloud. threat protection compliance archiving & governance secure communication
Governance from the Cloud threat protection compliance archiving & governance secure communication Speakers Darren Lee Vice-President & GM, Proofpoint 2 Agenda for Today s Discussion Agenda Who is Proofpoint?
More informationInformation Governance, Risk, Compliance
Information Governance, Risk, Compliance April White Paper By Galaxy Consulting A At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract May 2014 Information is the lifeblood
More informationTerrence Coan, CRM - Baker Robbins & Company 1
Life Cycle Management of Records in a Matter Centric Environment ILTA Records Management Peer Group Terrence Coan, CRM Orlando, Florida 2006 Baker Robbins & Company Agenda Current reality Why manage the
More informationPayday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending
6 June 2016 Practice Groups: Financial Institutions and Services Litigation Consumer Financial Services Commercial Disputes Class Action Litigation Defense Payday Loans Under Attack: The CFPB's New Rule
More informationLaunch of Mutual Recognition of Funds Between Mainland China and Hong Kong
June 2015 Practice Group: Investment Management, Hedge Funds and Alternative Investments Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong By Choo Lye Tan On 22 May 2015, the Securities
More informationThe CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
More informationHealth Care Entities Get Clarity from FCC on Telephone Communications
10 August 2015 Practice Group(s): Health Care Telecom, Media and Technology Health Care Entities Get Clarity from FCC on Telephone Communications By Martin L. Stern, Samuel R. Castic, Ryan J. Severson
More information2H 2015 SHADOW DATA REPORT
2H 20 SHADOW DATA REPORT Shadow Data Defined: All potentially risky data exposures lurking in cloud apps, due to lack of knowledge of the type of data being uploaded and how it is being shared. Shadow
More informationSEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers. November 12, 2010
SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers November 12, 2010 The Securities and Exchange Commission (SEC) has proposed rules to implement
More informationAlvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015
Alvarez & Marsal Global Forensic and Dispute Services 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationVietnam s Insurance Market: An Overview January 2014
Legal Update Insurance Vietnam 29 January 2014 Vietnam s Insurance Market: An Overview January 2014 1. Introduction Vietnam started liberalising its insurance market by allowing foreign insurers to participate
More informationSIDLEY PRELAW SCHOLARS INITIATIVE
2014 SIDLEY PRELAW SCHOLARS INITIATIVE The Sidley Prelaw Scholars Initiative is designed to increase diversity in law schools and within the legal profession by helping racially diverse, high-performing
More informationReal World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
More informationCRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS
CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION
More informationRegistration; Amendments or Updates to Registration
FEBRUARY 7, 2011 INVESTMENT MANAGEMENT UPDATE Registered Investment Adviser Annual Reviews; Calendar of Certain 2011 Significant Dates for Advisers Investment advisers that are registered with the Securities
More informationEnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
More informationGlobal Services and Capabilities
Global Services and Capabilities Our team of experts offers an unmatched combination of economic credentials, industry expertise, and testifying experience. GLOBAL SERVICES AND CAPABILITIES Insight in
More informationCybersecurity Risk Factors: Five Tips to Consider When Any Public Company Might be The Next Target
10 February 2014 Practice Groups: Capital Markets Insurance Coverage The text of this article was first published by Law360 on February 10, 2014. Cybersecurity Risk Factors: Five Tips to Consider When
More informationRecords Retention & E-Discovery. Preserving Electronically Stored Information for Litigation
Records Retention & E-Discovery Preserving Electronically Stored Information for Litigation Introduction Increasingly, data is created, sent, received, and stored electronically. In fact, 89 billion business
More informationCloud Computing: Privacy, Security and Other Issues and Obligations
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Cloud Computing: Privacy, Security and Other
More informationApplying Technology to Information Governance. Bennett Borden, Drinker Biddle Cathleen Peterson, Kroll Ontrack March 26, 2015
Applying Technology to Information Governance Bennett Borden, Drinker Biddle Cathleen Peterson, Kroll Ontrack March 26, 2015 Bennett Borden, Drinker Biddle bennett.borden@dbr.com (202) 230-5194 Bennett
More informationIntellectual Property Legal Issues Protecting IP Rights and Mitigating Infringement Risks in Virtual Storage and Applications
Presenting a live 90 minute webinar with interactive Q&A Cloud Computing: Intellectual Property Legal Issues Protecting IP Rights and Mitigating Infringement Risks in Virtual Storage and Applications WEDNESDAY,
More informationAs IDC looks back on ediscovery corporate technology priorities among the highly litigated industries in 2009, the following takeaways emerge:
C U S T O M E R N E E D S A N D S T R A T E G I E S e D i s c o v e r y P r i o r i t i e s A m o n g C o r p o r a t i o n s f r o m H i g h l y R e g u l a t e d a n d L i t i g a t e d I n d u s t r
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t
More informationApril Edition of Notable Cases and Events in E-Discovery
APRIL 16, 2015 E-DISCOVERY UPDATE April Edition of Notable Cases and Events in E-Discovery This update addresses the following recent developments and court decisions involving e-discovery issues: 1. A
More informationNAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat
NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona Information Governance Define your Process and Framework Agenda Information Governance Defined
More informationRemoval of Credit Ratings References
August 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Removal of Credit Ratings References By Michael S. Caccese, Clair E. Pagnano, Rita Rubin, and George
More informationOutsourcing has become a critical component of financial institutions management
Skadden Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or call your regular Skadden
More informationWhite Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
More informationA 6-POINT FRAMEWORK BUSINESS TECHNOLOGY GROUP
e Matters A 6-POINT FRAMEWORK BUSINESS TECHNOLOGY GROUP Companies considering adopting an electronic signature process may be overwhelmed by the legal, regulatory, litigation, technological and other practical
More informationInternational ediscovery. When Cyber Workspaces Collide with U.S. Litigation. May 1, 2012
International ediscovery When Cyber Workspaces Collide with U.S. Litigation May 1, 2012 Continuing Education Information We have applied for one hour of California, Minnesota, Texas and Virginia CLE and
More informationBeyond Credit Reporting: The Extension of Potential Class Action Liability to Employers under the Fair Credit Reporting Act
April 7, 2014 Practice Groups: Financial Institutions and Services Litigation Commercial Disputes Labor, Employment and Workplace Safety Consumer Financial Services Beyond Credit Reporting: The Extension
More informationClient Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards
Number 1462 February 5, 2013 Client Alert Latham & Watkins Litigation Department Accountants and Auditors as SEC Whistleblowers Nearly every public company and financial industry firm subject to the enforcement
More informationInformation Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
More informationGlobal ediscovery Document Review. Managed technology for the global legal profession
Global ediscovery Document Review 2014 Managed technology for the global legal profession Epiq Systems is a global leader in providing fully integrated technology products and services for ediscovery and
More informationNew York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Admitted in the State
New York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Provisions Permit Temporary Practice by Non-New York Attorneys and Registration of Non-U.S. Lawyers as In-House
More informationNAIC REINSURANCE COLLATERAL REFORM
NAIC REINSURANCE COLLATERAL REFORM BY CHARLENE C. McHUGH After several years of deliberation, on November 6, 2011, the National Association of Insurance Commissioners (NAIC) passed amendments to its Credit
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More informationDue Diligence in Regulation D Offerings
FINRA Provides Guidance on the Obligation of Broker-Dealers to Conduct Reasonable Investigations in Regulation D Offerings SUMMARY FINRA has published a regulatory notice providing guidance to broker-dealers
More informationMarch 2, 2015 Page 2. If you have any questions or need further information regarding this incident, please do not hesitate to contact me.
BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. FOUNDED 1866 March 2, 2015
More informationInsights into Cloud Computing
This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid
More information