News & Analysis as of

Policies and Procedures Information Governance Investigations

K2 Integrity

Information Leaks: How To Respond, Investigate, And Protect Your Business

K2 Integrity on

Information leaks pose a growing and multifaceted risk to organizations across sectors. While often associated with cybersecurity breaches, the majority of such incidents stem from human error or intentional misconduct. On 25...more

BakerHostetler

Deeper Dive: Preserving Ephemeral Messaging - Capture Data Before Its Ghosts Haunt Your Compliance

BakerHostetler on

Organizations whose mantra is “We just never delete anything” (i.e., organizations simply retaining all information indefinitely) are now facing headwinds, especially when the information contains personal information. As our...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

American Conference Institute (ACI)

[Virtual Conference] Practical Guide to FCPA Data Analytics - July 19th - 20th, 1:00 pm - 5:15 pm EDT

ACI’s Practical Guide to FCPA Data Analytics will take place on July 19 – 20, 2021 (EDT). This is a uniquely interactive event on how to harness data analytics, AI and machine learning for FCPA compliance, investigations and...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide