Account

Sign in to access your account and subscription

Information Governance and Compliance

  • Part Two of a Two-Part Article

    As the penalties being extracted by the United States from multinational corporations for violations of anti-corruption statutes have skyrocketed in recent years, an increasing number of other countries have begun to pass or enhance their own laws prohibiting, among other things, bribery of foreign officials, and have increased the financial penalties applicable to businesses that violate those laws.

    May 25, 2017Robert J. Anello and Peter Janowski
  • While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

    May 02, 2017Tim Anderson and JR Jenkins
  • Part One of a Three-Part Article

    There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

    April 02, 2017Jared Coseglia
  • Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

    April 02, 2017Ian Raine
  • Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.

    April 02, 2017Ari Kaplan
  • Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.

    April 02, 2017Michael Kemps and Kimberly Pease
  • The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.

    March 02, 2017Elizabeth B. Vandesteeg and Kathryn C. Nadro
  • As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.

    January 01, 2017Eric Hodge and Rich Blumberg
  • Optimal Insights Through Inter-Departmental Initiatives

    As dizzying amounts of resources and the need for the timeliest insights grow, the conduit and collaboration between business development and an organization's information management department, especially, becomes more critical than ever.

    November 01, 2016Peter Ozolin