article thumbnail

Information Governance and the Records Lifecycle

The Texas Record

In a nutshell, this is information governance. ARMA defines “information governance” as “the overarching and coordinating strategy for all organizational information. But how is information governance any different than records management? ” That sounds great! ” That sounds great! Extra Phases.

article thumbnail

Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for Public Companies

Data Matters

Securities and Exchange Commission (SEC) proposed new cybersecurity rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The SEC proposal would continue to ratchet up cybersecurity as an increasingly critical dimension of corporate governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Update on International and Cross-Border Discovery

AIIM

There have been some interesting developments in the world of E-Discovery tied to many of the same privacy protection laws and regulations changing the game in records and information management. Cross-Border and International Discovery Post-Schrems II ” with Bryant Isbell from Baker & McKenzie and Eric Mandel from Driven.

article thumbnail

[Infographic] The 6 Most Typical Challenges Enterprise Face When Collecting Data From Google Drive

Hanzo Learning Center

During the global pandemic, applications that power remote work have certainly gained rapid traction, often without time to map out governance policies and ediscovery playbooks. Therefore, companies must preserve, collect, and produce this data in response to discovery requests.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.

Privacy 97
article thumbnail

1.9 million+ records from the FBI’s terrorist watchlist available online

Security Affairs

The list is extracted by the e FBI Terrorist Screening Center (TSC) , a database used since 2003 by US feds and other agencies to track individuals who are “known or reasonably suspected of being involved in terrorist activities.”. . government agency, a third-party, or in the worst case by a threat actor that obtained it.

article thumbnail

Is Your Ability to Stay Current with eDiscovery in “Jeopardy”? Check Out This Conference: eDiscovery Best Practices

eDiscovery Daily

I mentioned it a few weeks ago, but (believe it or not) we’re now only about 3 1/2 weeks away from the eighth year for the University of Florida E-Discovery Conference. Once again, there will be an E-Discovery Career Fest the day before the conference. Hopefully, I won’t be singing this song afterward! ;o).