Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Recorded: Jul 26 2017 72 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Recorded: Jul 20 2017 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Recorded: Jul 20 2017 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!

    About the Speakers:

    Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

    Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

    Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Recorded: Jul 19 2017 56 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.

    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Recorded: Jul 18 2017 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Recorded: Jul 18 2017 55 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Recorded: Jul 18 2017 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms
    How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms Doug Austin and Karen DeSouza, Esq. Recorded: Jun 28 2017 63 mins
    Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. This webcast* will discuss how SaaS automation technology has revolutionized eDiscovery for solo and small firms today.

    Webcast Highlights:

    + How Automation and the Cloud is Affecting All Industries, including eDiscovery
    + Drivers for the eDiscovery Automation Revolution
    + The Impact of Automation and the Cloud on the Lawyer Job Market
    + The Evolution of eDiscovery Technology
    + Whip Me, Beat Me, Call Me EDna: Two Challenges, Seven Years Apart
    + Key Components of a SaaS eDiscovery Automation Solution
    + Cost Alternatives for SaaS eDiscovery Automation Solutions
    + Can Automation Really Disrupt the eDiscovery Industry?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring
    Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring Robert Huff, Managing Director, North America Recorded: Jun 15 2017 60 mins
    Regulators have been unequivocal in their expectation that companies know who they are doing business with. While pre-onboarding due diligence on third parties has become the cornerstone of most compliance programs, many companies are still feeling their way toward integrating effective post-onboarding monitoring strategies. Join Kroll's experts for an interactive discussion of steps you can take and resources you can leverage to define and execute a sustainable approach to third party monitoring.
  • ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects
    ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects Doug Austin and Karen DeSouza Recorded: Jun 15 2017 61 mins
    If you’ve conducted discovery for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” could occur that can derail your project. These issues can add considerable cost to your discovery effort through unexpected rework and also cause you to miss important deadlines or even incur the wrath of a judge for not following accepted rules and principles for discovery. This webcast* will discuss some of the most common “pitfalls” and “potholes” that you can encounter during the discovery life cycle and how to address them to keep your discovery project on track.

    Webcast Highlights

    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Ways to Avoid Potential Data Breaches
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Techniques to Increase Review Efficiency and Effectiveness
    + Checklist of Items to Ensure a Smooth and Accurate Production

    Presenters Include:

    
Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, technical project management and software development services to numerous commercial and government clients.

    
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data?
    GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data? FRA’s co-founders; Toby Duthie, Frances McLeod and Greg Mason Recorded: Jun 7 2017 61 mins
    With Safe Harbor being invalidated and EU-US Privacy Shield and Swiss-US Privacy Shield yet to be tested, UK data privacy post Brexit an unknown, the General Data Protection Regulation coming into effect throughout the EU next year, and the Trump administration potentially poised to ride roughshod over EU surveillance concerns– the uncertainty surrounding the current regulatory environment will inevitably add complexity to the issue of data transfers, especially in the context of international investigations and disputes – and, by extension eDiscovery.

    As regulatory investigations and related processes frequently span several years, strategic decisions made today around data transfers will have important ramifications down the line.

    Do you know where your/your client’s data currently is hosted and if it is being held in accordance with the various and, at times, conflicting data privacy laws? If the answer is 'no', significant reputation and even financial implications could ensue.

    This GIR Live webinar will break down the current data protection laws and set out some considerations and practical guidelines to minimize risk exposure for companies and professional services firms dealing with cross-border investigations and litigation.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:

    • Data privacy and adequate protection
    • What you can do now to remain compliant
    • How to manage conflicts of law in a global investigation with practical tips from real life case studies
  • What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017
    What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017 Doug Austin, Julia Romero Peter, Esq., Sean Hall and Paul Cobb Recorded: May 31 2017 62 mins
    You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.

    Webcast Highlights:

    + The State of Cybersecurity in the U.S. in 2017
    + Top Threats Facing Your Practice
    + Your Responsibility to Your Clients: The High Cost of Data Leaks
    + How to Protect Your Firm and Your Clients
    + Recent Developments in International Data Privacy
    + Criteria for Evaluating Providers in Your eDiscovery Projects
    + Ethics Considerations
    + Looking Forward: The Future of Cybersecurity in the Legal Field

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Sean Hall: Sean is the CEO of Firm Guardian, LLC. Sean has a decade of experience working with emerging start-ups from an executive level creating scalable, profitable businesses.

    Paul Cobb: Paul is the COO for Firm Guardian LLC. Paul is a business leader with twenty years of diverse experience in management, marketing, sales strategy, and operations.

    MCLE Approved in Selected States
  • Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase)
    Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase) Doug Austin Recorded: May 11 2017 61 mins
    This on-demand webcast provides an overview and demonstration of three CloudNine software offerings designed to extend and enhance legal discovery efforts of law firms and legal departments.

    Webcast Overview:

    The acceleration of data creation in today’s business world coupled with the requirement to understand, manage, and act on information throughout its lifecycle presents a challenge to information governance and legal discovery professionals seeking to balance process, products, and outcomes. This presentation and technology demonstration led by eDiscovery Daily Blog author and eDiscovery expert Doug Austin will provide attendees with an overview of data discovery and legal discovery and help them frame the lifecycle of data through the lens of data and legal discovery objectives, tasks, and tools.

    Presentation Highlights

    + The Objectives of Data Discovery and Legal Discovery
    + A Framework for Approaching Discovery
    + Tasks and Tools For Effective Discovery

    Demonstration Highlights

    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + NEW: Outpost from CloudNine: Data Transfer into Relativity
    + NEW: CloudNine Legal Hold Notification

    Webinar Presenter

    Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    To learn more about CloudNine, visit eDiscovery.co.
  • A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security
    A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security Bill Bonney (CISA) Vice President, Product Management, TechVision Research and Dario Forte, CEO, and Founder of DFLabs Recorded: May 10 2017 52 mins
    Cyber Security requires organizations to analyze and correlate data derived from the measurement of the right metrics. Every CISO is searching for the best practices for turning metrics and reporting into meaningful data for 3 important data sharing levels within organizations. Managing metrics and reporting for Security Operations and Incident Response can be a time consuming and costly project.

    In this webinar, our speakers will discuss how to strengthen and empower a security team’s ability to quickly assess and remediate security Incidents and data breaches.

    Including:
    • Review CISO’s guide for sharing SecOps and IR data with C-level, VPs, and Directors.
    • Discover true priorities in breach reporting.
    • Learn what organizations can do to improve the automated analysis of incidents.
    • Understand the trends and benchmarks in security automation and orchestration to include metrics and reporting.
    • How to orchestrate and automate processes and machine actions in order to mitigate damages.

    Hear from:
    Bill Bonney, a co-author of the seminal book for new CISOs, the CISO Desk Reference Guide – A Practical Guide for CISOs. Along with his co-authors, Bill has established the standard “go to” reference for setting up an effective Information Security program. Along with Dario Forte, CEO, and Founder of DFLabs who will also be presenting on orchestrate and automate processes. Dario Forte started his career in Incident response as a member of the Italian police. In that role, he has worked with United States governmental agencies including the National Aeronautics and Space Administration (NASA). He is Co-Editor of several ISO Standards within the 27000 series and holds the CFE, CISM and CGEIT certifications. The author of over 50 books and scientific papers, Dario has an MBA from the University of Liverpool and has completed select executive curriculum at the Harvard Business School.
  • Should Social Media Be Part of Your Information Governance Strategy?
    Should Social Media Be Part of Your Information Governance Strategy? Tom Mighell, VP Service Delivery, Contoural Recorded: May 5 2017 61 mins
    Corporate pressures to use social and other types of newer media continues to build. Part of the business sees using social media as an indispensable channel for reaching a newer generation of consumers. Yet in many industries uncertainties about compliance and recordkeeping requirements make companies cautious to use these new tools. Unlike more traditional media, social communications occur on third party venues and with posts, replies, and retweeting it becomes a gray area where your responsibilities start and end. In this webinar Tom Mighell from Contoural will review incorporating social media into your records management, eDiscovery, privacy and other elements of your information governance strategy. Topics will include:

    • Creating a media-agnostic program focused on content, not the underlying medium
    • Designing a program that can manage not only today’s social media, but also newer types of communications in the future
    • How much social content to retain, and by whom
  • Creating an Information Governance Project Plan
    Creating an Information Governance Project Plan Kathryn Hilton, VP, Contoural Recorded: May 5 2017 69 mins
    Many organizations are looking to upgrade their paper-centric records management program to better manage electronic information by incorporating records compliance, eDiscovery, privacy as well as employee productivity and launching an information governance program. Yet often the most difficult part these programs is getting started. Deciding what to do, in what order, how much and how quickly often determines the success of the entire project. Jumping into a project with an incomplete and ill-fitting plan can cause a program to stall out or even fail. On the other hand, a complete, well-designed information governance program project plan with appropriate milestones and metrics can drive a successful program forward. This webinar explores key elements for launching an information governance program and how to incorporate these elements into a roadmap that meets your organization’s specific needs. Join Contoural Vice President Kathryn Hilton as she covers:

    • Assessing your current state and determining appropriate target states. This will include a discussion of current information-governance-related frameworks, appropriate metrics as well as building a program business case.
    • Key program elements including Policy Development, Data Mapping, Data Placement Strategies, Technology Evaluation and Behavior Change Management Strategies.
    • Pulling all of these elements together into a successful roadmap
  • Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations
    Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Matt Axelrod (Partner, D.C.) Satindar Dogra (Partner, London) and Adam Lurie (Partner, D.C.), Linklaters LLP Recorded: May 3 2017 61 mins
    With cross-border enforcement on the rise, companies must consider what information, if any, to provide to various regulators. But that’s only the start of the challenge. Having decided to provide information, companies must carefully consider how to protect their privileged and otherwise protected information, including information subject to data protection law.

    This GIR Live webinar will break down these challenges as well as looking at various strategies that companies can take to protect that which is privileged or protected when interacting with regulators around the world.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:
    •How to protect privilege and data privacy during an internal investigation in response to a regulator.
    •How to interact with regulators while preserving privilege and data protection rules.
    • How do legal privileges and data privacy protections vary between key jurisdictions?
    •How does increasing cross-jurisdictional cooperation between regulators impact these considerations?
    •What recent developments should practitioners should be aware of?
  • Applying Records Retention and IG to Office 365
    Applying Records Retention and IG to Office 365 Greg Forest, CTO, Contoural Recorded: May 2 2017 58 mins
    One day, the decision is made to move the company’s messaging to Microsoft’s Office 365 cloud platform. While this may make it easier and less expensive to manage email and messaging, it raises a number of questions: How should we configure Office 365? What electronic records do we have, how do we manage them, and does Office 365 have the required functionality to support our policy? How much legacy email should we migrate to the new system? Do we want to just take advantage of the messaging and client features or should we move our documents to SharePoint Online and OneDrive for Business as well? How do we train our employees on the new system? How do we migrate our information to the new system? How many of these questions do we need to answer now, or can we just figure them out along the way? Office 365 adoption raises a host of Information Governance questions. In this webinar industry expert Greg Forest from Contoural will address:
    • Office 365 deployment options (cloud only and hybrid)
    • Implementing governance policies for Office 365 components
    • Office 365 migration and employee behavior change management strategies
    • Creating an Office 365-specific Information Governance roadmap
  • Protecting Against a Panama Papers Breach
    Protecting Against a Panama Papers Breach Mark Diamond, Contoural CEO Recorded: May 2 2017 57 mins
    A Panama law firm suffered a massive data leak exposing offshore holdings of government officials across the world and companies should take notice. While the media has focused on the politicians involved, this breach also points to a more insidious trend: A new normal has come into place whereby it’s seemingly OK to breach information and the media’s “right to know” appears to trump companies and law firms’ rights to keep their confidential, sensitive and even privileged documents and data private. Traditional privacy and cybersecurity efforts are often ineffective against these types of attacks, and new, smarter approaches are needed.
    In this webinar we will discuss:
     How the “Panama Papers” and other similar attacks represent a new type of risk
     Where traditional information security approaches often fall short
     Key steps companies can take to protect themselves
  • Building a Real Business Case for Information Governance
    Building a Real Business Case for Information Governance Mark Diamond, CEO, Contoural Recorded: May 2 2017 56 mins
    How do we take such a diverse program such as Information Governance, that can reduce risk, cost, and in many cases move the business forward, and leverage it in a way so that the organization can figure out what value it has and build a business case for senior management?
  • Applying Records Retention and Deletion to Structured Data
    Applying Records Retention and Deletion to Structured Data Greg Forest, CTO, Contoural Recorded: May 2 2017 59 mins
    Historically, records retention programs have focused on hardcopy paper records in addition to semi structured electronic information like email, and unstructured information such as files and images. Yet surveys indicate that up to 75% of most data reside in structured systems – relational and other types of databases that house application data. These systems contain records, privacy information and other content subject to legal and regulatory requirements. Most organizations, however, rarely apply retention deletion and other governance policies to this structured data, creating both non-compliance and risk.
  • Is It Time for Your Records Retention Schedule to Grow Up and Become Useful
    Is It Time for Your Records Retention Schedule to Grow Up and Become Useful Tom Mighell, VP of Service Delivery, Contoural Inc. Recorded: May 2 2017 60 mins
    We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your information governance foundation. Many organizations consider records retention as something that they have to do, but feel handcuffed because they have no way of enforcing a policy. This webinar covers the different ideas to get your records retention schedule “off the couch” and become something useful to your organization.
  • Files, Files Everywhere, Nor Any to Delete: Quick IG Cleanup Wins
    Files, Files Everywhere, Nor Any to Delete: Quick IG Cleanup Wins Tom Mighell, VP of Service Delivery, Contoural Recorded: May 2 2017 60 mins
    You’ve got a lot of Redundant, Obsolete and Trivial (ROT) files in file shares, desktops, SharePoint and other silos all over the company. There are just too many copies and too much ROT content dragging down your storage systems, making discovery much harder, and making it difficult to comply with your record policies. But while it sounds easy, hitting the delete button can be trickier than it sounds. A smart and quick ROT file deletion project that cleans up your digital house can work to lower costs and reduce risks. In this session we discuss practical and tactical real world approaches to get rid of the ROT both quickly and defensibly.
  • Using Metrics to Measure an Information Governance Program
    Using Metrics to Measure an Information Governance Program Dan Elam, VP and Consultant, Contoural, Inc. Recorded: May 2 2017 56 mins
    Information Governance programs often involve a number of moving parts across an enterprise. But how do you know if your program is working? Likewise, how do you demonstrate to senior management as well as courts and regulators that you have an effective program? Existing frameworks often do little to measure program effectiveness in key areas, and can serve as target benchmarks moving forward. Join Dan Elam from Contoural as we discuss real-world strategies for applying metrics.