This is a course outline for the session.
Imagine you are in house at a digital/eCommerce company and your business team approaches you with plans to start selling internationally. They regale you with grand promises from global payment providers: "They'll take care of everything—local website, language translation, exchange rate, payment facilitation, etc. It's plug and play!" Not so fast. Before you get moving, there are a myriad of other essential pieces to consider: Will you be shipping physical products - if so, how and from where? Have we thought about customs duties, local product regulations, corporate tax implications, terms and conditions, and IP rights? Are there marketing and advertising restrictions in local countries? What data protection and security issues will we face? Join this session to delve into the many issues consumer-facing companies should address when seeking to expand globally.
The over-retention of information is the No. 1 information governance challenge companies face. Keeping too much information needlessly drives up discovery costs and creates unnecessary risk of a data breach. But why is it so difficult to hit the delete button? How do companies and in-house counsel get comfortable actually deleting information? This session will discuss how in-house counsel can lead an initiative to reduce the amount of data their companies retain by 50 percent or more. The panel will lead a non-technical discussion on who should be involved, what existing IT resources are required, decision points, and, most important, results.
Information governance (IG) overwhelms companies, creating compliance risks, increased discovery costs, privacy threats, and lower employee productivity. Siloed approaches to information governance fall short. This program explores building the case for a cross-functional approach to information governance. After this session, attendees will be able to list IG compliance risks and related in-house counsel’s ethical responsibilities; identify messaging strategies to get C-suite support for IG; list the ideal composition of an IG committee; obtain a seven-step project plan for launching an IG program; and quantify the benefits of an IG program. Attendees will also receive a business case outline to present to the C-suite, sample committee charter, and checklist of do’s and don’ts in building your case.
This Essay examines the concerns of big data disparate impact through the lens of American antidiscrimination law—more particularly, through Title VII’s prohibition of discrimination in employment.
This report examines several case studies from the spheres of credit and lending, hiring and employment, higher education, and criminal justice to provide snapshots of opportunities and dangers, as well as ways that government policies can work to harness the power of big data and avoid discriminatory outcomes in the United States.
As noted in a recent New York Times article, “there is a widespread belief that software and algorithms that rely on data are objective. But, software is not free of human influence. Algorithms are written and maintained by people, and machine-learning algorithms adjust what they do based on people’s behavior.” In an era where big data is used for decision-making purposes, the legal profession grapples with possible hidden bias and the need for greater transparency in the use of black-box algorithms. This session will explore data ethics and the need for its inclusion in information governance conversations within corporations as entities collect, use, and monetize client data. The session will explore C-suite transparency in connection with software used for insider threat monitoring and surveillance, making hiring decisions, and monitoring various forms of employee behavior.
Media and security experts focus so much attention on hackers and external threats that companies have a false sense of reality. The more likely threat, and one that could cause damage on a larger scale is the insider — the individual who has been given clearance to enter the building, and access your IT system, products, and customers. This session will highlight why you should have a program to proactively identify and mitigate insider threats. It will focus on developing an awareness of the common types of insider threats; providing an understanding of the security risks posed by insiders to your company and customers; sharing several easy steps for building a program to detect and prevent insider threats; identifying the legal and privacy risks domestically and globally when developing and implementing a program; and discussing the global considerations when developing a program.
This is a program outline for the session.
This program will explore the best practices for companies that manage vendors and cybersecurity concerns. Some of the significant questions to be addressed include: What are some best practices for vendor due diligence? How can vendor cybersecurity risks be addressed and mitigated, both contractually and otherwise? What role, if any, should in-house counsel have in vendor management?