IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP



Similar documents
Management: A Guide For Harvard Administrators

R Scott Murchison CRM

Discovery Technology Group

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

Information Governance

The Ethical Obligations of an Attorney When Using Technology

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

State of Michigan Records Management Services. Guide to E mail Storage Options

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

The Future of Records Management. Senior Director, Loss Prevention Project Manager/Developer

Electronic Discovery How can I be prepared? September 2010

How To Preserve Records In Mississippi

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

Southern Law Center Law Center Policy #IT0004. Title: Policy

This policy is not designed to use systems backup for the following purposes:

Congregation Data Security Education

Global Headquarters: 5 Speen Street Framingham, MA USA P F

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Part 2: Records and Information Management: Creation and Use

Dublin City University

PROCEDURES FOR ELECTRONIC MANAGEMENT OF RULEMAKING AND OTHER DOCKETED RECORDS IN THE FEDERAL DOCKET MANAGEMENT SYSTEM

Management Trends, Troubles, and Solutions

How To Write A Health Care Security Rule For A University

Local Area Networking

Retention and Archiving

Supplier Security Assessment Questionnaire

Newcastle University Information Security Procedures Version 3

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

RECORDKEEPING MATURITY MODEL

Table of Contents. Chapter No. 1. Introduction Objective Use Compliance Definitions Roles and Responsibilities 2

Retention & Disposition in the Cloud Do you really have control?

Special Report: ROI of Records Management for Legal Discovery

HIPAA Security COMPLIANCE Checklist For Employers

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

RECORDS MANAGEMENT POLICY

Data Security Policy

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Building an ROI Business Case for Archiving. Redgrave Daley Ragan & Wagner LLP

How To Audit Health And Care Professions Council Security Arrangements

INTERNATIONAL SOS. Data Retention, Archiving and Destruction Policy. Version 1.07

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

The Many Different Types of Electronic Discovery Searches

OFFICE OF CHIEF COUNSEL OPERATION R.E.D. GUIDANCE

Information Governance & Records Management for Today's World

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Records and Information Management and Retention

CITY OF ELK GROVE CITY COUNCIL STAFF REPORT

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

How To Manage Records In A Cloud

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

UNIVERSITY OF MANITOBA PROCEDURE

The Next Frontier. for Records Managers. Retention and Disposition of Structured Data:

From Archiving to Legal Holds: Comprehensive Information Management

Backup Policy. Document Title: No. Pages 5. Document Type: Policy. Scope: OCIO, Operations Branch

9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4

Proactive Data Management for ediscovery

EFFECTIVE DATE: JULY 1, 2010

Supplier Information Security Addendum for GE Restricted Data

CMA Shipping Ethics and E-Discovery in Shipping Disputes

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

University of Liverpool

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Best Practices Series Document Retention and Best Practices

Arizona State Library, Archives and Public Records

HIPAA Security Alert

Preparing for. Helen Streck Records Management Consultant

How To Manage Records And Information Management In Alberta

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

4.10 Information Management Policy

UMHLABUYALINGANA MUNICIPALITY

How To Manage Cloud Data Safely

Data Compliance. And. Your Obligations

Director, Value Engineering

Policy Outsourcing and Cloud Based File Sharing

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

BEST PRACTICES FOR MANAGEMENT OF LOTUS NOTES RECORDS September 4, 2003

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

'Namgis Information Technology Policies

The Future of Information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Administrative Procedure

Union County. Electronic Records and Document Imaging Policy

What Data? I m A Trucking Company!

Wood River Land Trust LTA Standard 2: Compliance with Laws 2B: Incorporation/Bylaws 2C: Tax Exemption 2D: Records Policy 2E: Public Policy

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

Virginia Commonwealth University School of Medicine Information Security Standard

Information Security Policies. Version 6.1

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Congregation Identity Theft Education Program

Validating Enterprise Systems: A Practical Guide

Transcription:

IT Roles in Loss Prevention Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP

What is Loss Prevention (Risk Management)? Mitigate risk Protect the Firm s assets Departments can include: Records Management Conflicts Docket Audit Letters ARDC Registration IRS Reporting for Corporate Transactions Coordination of Lobbying Activity Reporting

What does this have to do with IT? We are protecting the I in IT The I is a primary Firm asset Improperly managing the I can create risk events IT is often the control point for the I

Types of Risk Wrongdoing - deliberate negligence Mistakes Bad policies Bad procedures Lack of knowledge Mismanagement Risk against the lawyer s duty to protect clients confidential information

Areas of IT Strategy Infrastructure/Networking Help Desk/User Support Desktop Applications Enterprise Applications Litigation Support Development

Strategy Risk must be assessed at every level of the overall strategic technology plan How information is captured/created/received? How it is accessed and by whom? How information is used and transmitted? How information is disposed of? How will systems integrate to reduce proliferation? Classification, retention and access

Risk vs. Impact (or Firm vs. User) High Risk Firm Low Risk Negative Business Impact User Positive Business Impact

Infrastructure/Networking/IT Security Data protection and security Decommissioning servers, laptops, desktops Backup tapes Disaster Recovery Removable Media Password change frequency Encryption Website traffic

Help Desk/User Support The belly of the beast Access to information Activity of information Adding Deleting Printing Copying/Transferring Often the warning system for risk events Business risk events Records risk events Using controls to manage the risk

Information Management Lifecycle (source: KPMG) Phase 2 Storage Access Control Structured v. Unstructured Integrity/Confidentiality ti Availability Phase 1 Generation Ownership Classification Governance Phase 3 Use Internal v. External Third Party Appropriateness Phase 7 Compliance Compliance & Audit Monitoring Process & Controls Phase 4 Transmission Public v. Private Networks Encryption Requirements Access Control Phase 5 Archival Legal & Compliance Offsite Considerations Media Concerns Phase 6 Destruction Secure Destruction Record Retention

Desktop Applications Lifecycle of information Capture/Create/Receive Use/Circulation/Transmission Short Term storage Long Term storage Disposition Locking down the desktop Applying ethical walls and protecting confidentiality

Enterprise Applications Determine personal control vs. Firm control Establish matter information owners Establish proper access controls Establish consistent, repeatable procedures for incoming/departing personnel and transferring information to the client Two biggies Email (automatic addresses, reply all, metadata, spam, retention periods) DMS (classification, retention, access)

Litigation Support Are you using internal staff to handle Firm discovery requests? The devil is in the details Consider outsourcing internal discovery Consider conflicts checks on lit support staff

Development Don t develop in a vacuum; requires coordinated effort to reduce proliferation of information Consider Lifecycle Access Classification Preservation Retention/Destruction Back-up

Key Issues Classification (structured vs. unstructured data) Retention, Preservation, Destruction (develop an exit strategy, how will you preserve, how will you securely destroy) Security, Protection, Access (ethical walls, confidential matters)

What if I don t have a Loss Prevention Department? General Counsel Litigation Partner Records Manager Malpractice insurance carrier ABA Model Rules of Professional Conduct Ethics Opinions BNA Lawyers Manual on Professional Conduct

Great resources Information Nation: Seven Keys to Information Management (author Randolph Kahn, Esq.) www.aiim.org www.arma.org Thank you!