Features

A Roadmap for Implementing Information Governance In Law Firms
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.
Features

Crafting an Effective Roadmap for Implementing Information Governance In Law Firms
This article discusses why a robust IG program is critical to modern-day law firm operations, the complexities associated with crafting such a program, and what a high-level roadmap for implementing the program looks like.
Features

Assess Your Information Governance Practices In Light of DOJ and SEC Crackdown on Use of Personal Devices and Messaging Apps
This article summarizes the DOJ's recent guidance and the SEC's enforcement trends and priorities in this area, and it provides information governance best practices companies can implement now to ensure they are meeting regulators' expectations and recordkeeping rules.
Features
The Message Is Clear: Assess Your Information Governance Practices In Light of DOJ and SEC Crackdown on Use of Personal Devices and Messaging Apps
Regulators increasingly are scrutinizing employee use of personal devices and third-party messaging apps. This article summarizes the DOJ's recent guidance and the SEC's enforcement trends and priorities in this area, and it provides information governance best practices companies can implement now to ensure they are meeting regulators' expectations and recordkeeping rules.
Features

The Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features

How to Solve the Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features

Solving the Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features

EDRM Asks for Public Comment on New Information Governance Model
Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."
Features

Why Untangling the CISO from IT Can Improve Governance and Security Outcomes
Despite the fact that the CISO's duties are growing in scope and importance, and data protection has become a board-level concern, many security leaders still do not have a direct line to the CEO.
Features

Clients Drive Information Governance: Business Benefits Flow to Firm
Information governance and the protection of corporate data are top concerns for law firms. To ensure standards are met, some clients are now tying payment to compliance with Outside Counsel Guidelines (OCG).
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Landlord & Tenant LawHoldover Tenant Liable for Breach of Covenant Landlord's Acceptance of Rent for 20 Years Waived Right to Challenge Tenancy and to Prevent Exercise of Options to Renew DHCR's Decision Destabilitzing Apartment UpheldRead More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›