News & Analysis as of

Cybersecurity Data Retention Information Governance

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Ankura

Build A Data Inventory That Benefits Everyone

Ankura on

A data inventory is the fundamental building block for an effective privacy program.  In its simplest form, a data inventory can be thought of as a matrix which documents 1) what personal data is being collected by the...more

Morgan Lewis

California Approves Even Tougher Privacy Laws

Morgan Lewis on

A majority of California voters approved the California Privacy Rights Act of 2020 (CPRA) on November 3. The CPRA expands provisions of the California Consumer Privacy Act (CCPA), creates new consumer privacy rights,...more

Association of Certified E-Discovery...

Here’s How You Want to Be Governing Enterprise Information: An Ounce of Prevention Is Worth a Pound in Cure

In the eDiscovery world, we talk a lot about understanding the rules as it pertains to putting a Legal Hold on data, collecting that data, and proportionality. One of the reasons costs have been continuously increasing is...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide