Information Governance Benchmark Report in Global 1,000 Companies
[ Source: Compliance, Governance, and Ovesight Council (CGOC) ]
October 2010-
Many have talked about the gap between legal and IT, or the importance of records management to enabling more rigorous discovery or information disposal, but no one has measured how big the gap is or assessed what stakeholders on all sides believe is necessary or possible to do in order to close the gap. CGOC, in concert with EDRM and the new Information Management Reference Model project, decided to assess the gap and how companies ...
Developing a Defensible Disposal Strategy - IT Teams Shouldn't Have to Make a Billion Choices
[ Source: PSS Systems ]
September 2010-
Too Much Data, Not Enough Value
It's commonly understood that data not subject to legal or regulatory requirement and without any business value should be disposed, and doing so is getting more important every day:
• 40 percent or more of corporate data is not subject »»to a specific legal duty and has no business value
• Corporate data volume grew by about 50 percent »»last year, while budgets grew by 0 percent
• IT spend averages 3.5 percent of revenues – data »»...
Ten Questions to Identify Compliance Risks When Sharing Information
[ Source: Brainloop ]
September 2010-
Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. How can companies enforce security policy and cost-effectively meet compliance objectives when documents must be shared with partners, investors, board members, and others outside the enterprise?
This white paper by Cheryl Klein, CPA, CISA, ...
The Evolution of the Legal Profession
[ Source: DiscoverReady ]
May 2010-
DiscoverReady, a leading provider of adaptive discovery management services, recently commissioned Ari Kaplan of Ari Kaplan Advisors to interview more than two dozen prominent members of the legal community to hear their perspectives about the past, present, and future of the legal profession, following the economic downturn of 2008-2010. The research includes industry perspectives from deans of law schools, law professors, law firm partners, and in-house counselors on a range of topics including how technology ...
How To Manage Effectively Operational Risk For Basel II, Solvency II And Arrow
[ Source: easy2comply ]
September 2008-
Operational risk exists everywhere in the business environment. It is the oldest risk facing any commercial institution and in particular banks, insurance companies, and other financial institutions. Any financial institution will face operational risk long before it decides on its first market trade or credit transaction. Of all the different types of risks financial institutions face, operational risk can be the most devastating and at the same time, the most difficult to anticipate. Its appearance ...
How To Implement An Integrated GRC Architecture
[ Source: easy2comply ]
January 2008-
Risk Management, compliance and governance reforms that followed the corporate failures of the past decade have dramatically changed today’s business environment. Organizations worldwide are coping with a proliferation of new regulation and standard, and are challenged to do so in a way that supports performance objective, upholds stakeholder expectations, sustains value and protects the organization’s brand. Recent studies indicate that Fortune 1,000 corporations are subject to 35-40 different regulatory mandates and the management of ...
The Basics On Handling E-mail Attachments In e-Discovery
[ Source: Fios, Inc. ]
October 2009-
In the last few years, courts have become more familiar with the underlying technology of e-mail attachments. Arguments courts accepted only three years ago for mishandling attachments –- vendor errors during collection or processing, mistakes with e-mail archiving systems –- will not hold water in many courts today. Other than document review, nothing in e-discovery is as costly or time-consuming as an order to re-produce a bad production. It is imperative for the producing and ...
The Information Technology Agreement, A Practical Introduction
[ Source: Thomas J. Hall, Attorney At Law, SC ]
May 2009-
This is an introduction to negotiating and drafting information technology contracts that maximize the opportunity for a successful project. The paper explores a number of reasons IT projects fail, and suggests ways to use the contracting process to avoid these pitfalls. The approach is concrete and practical, recognizing that the contract, like the underlying project, must help solve a particular business need if it is to contribute to the success of the organization.
Understanding and Preparing for eDiscovery
[ Source: B&L Associates, Inc. ]
October 2008-
Business history will note 2006 as a watershed year for how banks and other companies tackled management of their generated electronic data. Marked changes to the Federal Rules of Civil Procedure (FRCP) created the buzzword “eDiscovery,” causing companies to scramble to determine whether they were effectively managing their electronically stored data.
Seven Keys For Successful Domain Portfolio Management
[ Source: MarkMonitor ]
March 2009-
The world of domains continues to change at an alarming pace. In the last several years, there has been a proliferation of new ccTLD IDNs (Internationalized domain names), many new second-level, and third-level ccTLD offerings, nine new sTLDs, significant changes to ICANN’s Transfer and Whois Policies, and finally, ICANN’s proposal to allow an unlimited number of new gTLDs, including IDN TLDs. For companies with a global presence, managing an international domain name portfolio ...