This checklist shows how the reputational and legal risks associated with not being in control of corporate data should be enough to capture the attention of the corporate C-suite.
While many organizations have an Incident Response (IR) Plan, they are often left on a (digital) shelf to collect dust instead of being used as a roadmap when an intrusion occurs. These are five common pitfalls that come up with IR Plans, which your organization can avoid.
This checklist outlines some exemplary laws and regulations that should at least be considered as potentially relevant when formulating corporate IG policies and programs.
This checklist of issues and questions can help you develop your data breach after-action report (AAR) to account for how your organization detects, responds, and recovers from a breach.
There is no “one-size-fits-all” approach to implementing a workable information governance framework and policies program in your corporate organization. This checklist is a generic guide that will need front-end thought and tailoring to fit each firm’s unique circumstances.
This checklist shows 7 steps you can take to confront the issue of executives and employees using Shadow IT services & apps for corporate purposes.
This sample provides practice points and a checklist of what constitutes taking “reasonable steps” to help avoid sanctions under the newly amended FRCP 37(e).
This Global Data Breach Notification Guide is a resource for companies to benchmark the ever expanding range of global breach notification requirements.
This article aims to provide the fintech industry in Hong Kong with a comprehensive study of the key features, benefits, risks and potential of Distributed Ledger Technology (blockchain).
This Wisdom of the Crowd was compiled from the questions and responses posted on the Litigation eGroup addresses the definition of confidential information in a Non-Disclosure Agreement.