Sort results by: Published date | Company name
Showing items 1-15

Developing a Defensible Disposal Strategy - IT Teams Shouldn't Have to Make a Billion Choices [ Source: PSS Systems ]

September 2010- Too Much Data, Not Enough Value It's commonly understood that data not subject to legal or regulatory requirement and without any business value should be disposed, and doing so is getting more important every day: • 40 percent or more of corporate data is not subject »»to a specific legal duty and has no business value • Corporate data volume grew by about 50 percent »»last year, while budgets grew by 0 percent • IT spend averages 3.5 percent of revenues – data »»...

Ten Questions to Identify Compliance Risks When Sharing Information [ Source: Brainloop ]

September 2010- Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. How can companies enforce security policy and cost-effectively meet compliance objectives when documents must be shared with partners, investors, board members, and others outside the enterprise?

This white paper by Cheryl Klein, CPA, CISA, ...

The Evolution of the Legal Profession [ Source: DiscoverReady ]

May 2010- DiscoverReady, a leading provider of adaptive discovery management services, recently commissioned Ari Kaplan of Ari Kaplan Advisors to interview more than two dozen prominent members of the legal community to hear their perspectives about the past, present, and future of the legal profession, following the economic downturn of 2008-2010. The research includes industry perspectives from deans of law schools, law professors, law firm partners, and in-house counselors on a range of topics including how technology ...

How To Manage Effectively Operational Risk For Basel II, Solvency II And Arrow [ Source: easy2comply ]

September 2008- Operational risk exists everywhere in the business environment. It is the oldest risk facing any commercial institution and in particular banks, insurance companies, and other financial institutions. Any financial institution will face operational risk long before it decides on its first market trade or credit transaction. Of all the different types of risks financial institutions face, operational risk can be the most devastating and at the same time, the most difficult to anticipate. Its appearance ...

How To Implement An Integrated GRC Architecture [ Source: easy2comply ]

January 2008- Risk Management, compliance and governance reforms that followed the corporate failures of the past decade have dramatically changed today’s business environment. Organizations worldwide are coping with a proliferation of new regulation and standard, and are challenged to do so in a way that supports performance objective, upholds stakeholder expectations, sustains value and protects the organization’s brand. Recent studies indicate that Fortune 1,000 corporations are subject to 35-40 different regulatory mandates and the management of ...

The Basics On Handling E-mail Attachments In e-Discovery [ Source: Fios, Inc. ]

October 2009- In the last few years, courts have become more familiar with the underlying technology of e-mail attachments. Arguments courts accepted only three years ago for mishandling attachments –- vendor errors during collection or processing, mistakes with e-mail archiving systems –- will not hold water in many courts today. Other than document review, nothing in e-discovery is as costly or time-consuming as an order to re-produce a bad production. It is imperative for the producing and ...

The Information Technology Agreement, A Practical Introduction [ Source: Thomas J. Hall, Attorney At Law, SC ]

May 2009- This is an introduction to negotiating and drafting information technology contracts that maximize the opportunity for a successful project. The paper explores a number of reasons IT projects fail, and suggests ways to use the contracting process to avoid these pitfalls. The approach is concrete and practical, recognizing that the contract, like the underlying project, must help solve a particular business need if it is to contribute to the success of the organization.

Understanding and Preparing for eDiscovery [ Source: B&L Associates, Inc. ]

October 2008- Business history will note 2006 as a watershed year for how banks and other companies tackled management of their generated electronic data. Marked changes to the Federal Rules of Civil Procedure (FRCP) created the buzzword “eDiscovery,” causing companies to scramble to determine whether they were effectively managing their electronically stored data.

Seven Keys For Successful Domain Portfolio Management [ Source: MarkMonitor ]

March 2009- The world of domains continues to change at an alarming pace. In the last several years, there has been a proliferation of new ccTLD IDNs (Internationalized domain names), many new second-level, and third-level ccTLD offerings, nine new sTLDs, significant changes to ICANN’s Transfer and Whois Policies, and finally, ICANN’s proposal to allow an unlimited number of new gTLDs, including IDN TLDs. For companies with a global presence, managing an international domain name portfolio ...

Time, Risk, And Cost In Electroinc Discovery [ Source: Orange Legal Technologies ]

February 2009- Balancing time, risk, and cost in the conduct of electronic discovery continues to be one of the greatest challenges faced by legal professionals today. Technology advances, laws which further define electronically stored information (ESI), and current economic conditions all serve to increase both the importance and complexity of meeting this challenge of balance. How does one best approach the conduct of the key electronic discovery tasks of evaluating (analytics), processing, and reviewing ESI in preparation ...

Conceptual Search in Electronic Discovery [ Source: Orange Legal Technologies ]

January 2009- According to the Radicati Group, the average business mailbox contains 4.3 GB of potentially discoverable ESI. The burden of dealing with that volume is obvious. Automated tools to help identify responsive and privileged documents are being used more and more as the only viable way to manage these massive volumes of information. Electronic Discovery professionals have been looking for ways to limit the number of documents that need to be reviewed, because review is usually the ...

Considering Third-Generation Discovery: Two Approaches For Evaluating eDiscovery Offerings [ Source: Orange Legal Technologies ]

December 2008- With the many products and services available in the marketplace today, the need to be able to uniformly contrast and compare electronic discovery offerings continues to grow. Even though more and more vendors are providing pricing comparison tools that can help in considering their offerings, there continues to be a need for comparison frameworks to help electronic discovery professionals systematically evaluate offerings beyond pricing and through the lens of additional factors to include capability, delivery ...

Compliance Rules: Best Practices for Cost-Effective, Comprehensive Compliance [ Source: MessageLabs, Symantec Hosted Services ]

December 2010- Unmanaged email and other ESI can trigger financial, productivity, and legal nightmares should your organization one day find itself embroiled in a workplace lawsuit. Best practices call for a proactive approach to email management. Combine written content, usage, and retention policies with a Hosted Managed Email Archiving Service to ensure your organization's ability to preserve, locate, and produce legally valid email evidence.

Digital Signature Solution [ Source: Arx ]

September 2007- As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid return on investment (ROI).