This is a sample records retention schedule with citations.
Outlines sample data map population strategies.
This is a sample of data map design strategies.
Outlines key concepts and recommended practices for creation of a Data Security policy.
This is a sample procurement contract review process map.
This is a sample data map example showing data map system table fields.
How do you deal with employee data after termination? In this article, various companies provide answers in post-termination situations dealing with electronic and company data.
Charter for a cross functional Information Governance Committee.
An Information Governance Steering Committee, comprised of senior level people, with cross-functional capabilities, can drive the program though the organization. An Information Governance Committee Charter documents the purpose, structure and roles and responsibilities of the Committee.
This is an information governance senior management business case checklist.
This is a sample records retention schedule without citations.
This is a sample of data map population strategies.
This is a sample of data map use cases.
This article outlines the benefits of replacing a reactive, ad-hoc discovery process with a proactive litigation readiness program that can substantially reduce the risks and costs of implementing legal holds, collecting relevant electronically stored information (ESI), and otherwise responding to eDiscovery requests for companies based in the United States.
Sample project plan for starting or upgrading a records retention or information governance program.
One of the first tasks in developing your program will be creating a list of projects and priorities. A good roadmap will include projects, tasks and resources over a two to three-year timeframe. Be sure to evaluate which projects will have the greatest impact to the organization and look for short term quick wins. Quick wins will demonstrate the benefits of the program and help build momentum for future projects.
This white paper explores the reasons that defensible disposition programs stall out, and outlines several strategies to help organizations “push the delete button” with confidence.
This sample form outlines what a data map is, as well as some design strategies.
This article addresses questions for employers to consider and some of the key issues that social media use (and misuse) presents for employees.
This short article summarizes ten key areas where in-house counsel may consider the use of data analytics either as a solely in-house measure or in connection with engagements with outside counsel.
This Wisdom of the Crowd (ACC member discussion) addresses the challenges associated with moving from hard copy contracts and towards electronic records management systems, under US law. This resource was compiled from questions and responses posted on the forum of the Law Department Management ACC Network.*
This resource presents ten key considerations about developing an effective Document Retention Policy (DRP) that can be used in the United States.
This top ten lists ten tips when implementing a record policy for electronic information including emails, files and records in databases.
This brief resource (QuickCounsel) speaks about employee behavior change management programs for Information Governance in the United States.
This Top Ten lists the attributes of a modern, compliant and executable records retention schedule
This Quick Counsel outlines how to hire, train, develop objectives for, and supervise a records management & information governance team.
This 4th annual LegalSEC study provides key insights into the InfoSec programs and practices specific to legal firms.
This ACC Guide (InfoPAK) is a primer for in-house counsel starting, building, executing, and refining an Information Governance program.
This article was published in the Tech Toolbox column of the ACC Docket, ACC's award-winning publication. If you work for a multinational company, your department should be striving to harness all of the global resources to manage data transfer across borders.
This is a list of some basic action items to consider, given the widespread and ongoing impact of WannaCry ransomware, along with the likelihood of spin-off ransomware coming in the near future.
This sample lists the steps to building a successful and defensible records management program.
This is a list of supplemental resources for the session.