Features
A Roadmap for Implementing Information Governance In Law Firms
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.
Features
Crafting an Effective Roadmap for Implementing Information Governance In Law Firms
This article discusses why a robust IG program is critical to modern-day law firm operations, the complexities associated with crafting such a program, and what a high-level roadmap for implementing the program looks like.
Features
Assess Your Information Governance Practices In Light of DOJ and SEC Crackdown on Use of Personal Devices and Messaging Apps
This article summarizes the DOJ's recent guidance and the SEC's enforcement trends and priorities in this area, and it provides information governance best practices companies can implement now to ensure they are meeting regulators' expectations and recordkeeping rules.
Features
The Message Is Clear: Assess Your Information Governance Practices In Light of DOJ and SEC Crackdown on Use of Personal Devices and Messaging Apps
Regulators increasingly are scrutinizing employee use of personal devices and third-party messaging apps. This article summarizes the DOJ's recent guidance and the SEC's enforcement trends and priorities in this area, and it provides information governance best practices companies can implement now to ensure they are meeting regulators' expectations and recordkeeping rules.
Features
The Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features
How to Solve the Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features
Solving the Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features
EDRM Asks for Public Comment on New Information Governance Model
Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."
Features
Why Untangling the CISO from IT Can Improve Governance and Security Outcomes
Despite the fact that the CISO's duties are growing in scope and importance, and data protection has become a board-level concern, many security leaders still do not have a direct line to the CEO.
Features
Clients Drive Information Governance: Business Benefits Flow to Firm
Information governance and the protection of corporate data are top concerns for law firms. To ensure standards are met, some clients are now tying payment to compliance with Outside Counsel Guidelines (OCG).
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Grappling With Post-Term Commissions In Personal Management ContractsA recent judicial decision in a dispute between a management company and r&b artist KEM involved in part whether discussions about extending the term of years between the parties and increasing the manager's commission were binding, even though post-term commissions weren't discussed.Read More ›
- The Seventh Circuit's Decision In 'Motorola v. Hytera': Examining the Extraterritoriality of the DTSACan a company's trade secrets misused abroad give recourse on the extraterritoriality of the Defend Trade Secrets Act? Yes, said the 7th Circuit in an important new case which provides a roadmap for future cases involving international trade secret theft, finding liability for foreign misappropriation triggered by a domestic act.Read More ›