News & Analysis as of

Policies and Procedures Employee Training Information Governance

K2 Integrity

Information Leaks: How To Respond, Investigate, And Protect Your Business

K2 Integrity on

Information leaks pose a growing and multifaceted risk to organizations across sectors. While often associated with cybersecurity breaches, the majority of such incidents stem from human error or intentional misconduct. On 25...more

Lighthouse

Emerging Trends in Second Requests

Lighthouse on

From increasing regulatory scrutiny to the best way to handle modern attachments, experts share their insights, best practices, and projections to help organizations and law firms prepare for upcoming Second Requests....more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Baker Donelson

Electronic Discovery Preparedness Audit Handbook

Baker Donelson on

While your organization may not regularly be involved in costly or complicated litigation, there are instances in which it may nonetheless be required to identify, collect, and produce documents most likely in the form of...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide