Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene. Data has a useful life. For some vital corporate records, that useful life could be nearly infinite. But for the vast majority of data, there is a point at which it no longer has business value. As data ages, the likelihood of it ever being accessed again decreases exponentially. Eventually, almost all of it becomes redundant, obsolete, or trivial (ROT).
Continued ownership of digital debris constitutes a significant and growing expense. Raw storage space may be cheap, but due to the increasing costs of security, labor, migration, maintenance, etc., the total cost of ownership of enterprise data has trended upward. Even if the trend reverses, the trajectory of increasing data volumes is unlikely to abate. Indeed, enterprise data is currently doubling every 24 months.
Moreover, obsolescent data can have negative value due to the possibility of a data breach. Unnecessary retention of personally identifiable information (PII), protected health information (PHI), payment card industry data (PCI), and a host of other consumer, employee, and business information exposes organizations to criminal, civil, and regulatory penalties. While legislative and regulatory activity had historically been focused on relatively established requirements of what organizations must keep (e.g., for tax purposes), legislators and regulators are now also focused on quickly evolving requirements of what data organizations may obtain, the manner in which they obtain it, for how long they may keep it, and how they must protect such data. Consequently, organizations are not simply spending money to store data that lacks value; they are spending money to perpetuate latent liabilities that grow more serious with time.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.