Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.

Search Filters
HigherLogic Feed ID
a098f18f-5d20-4a2f-a47c-b237aefcef47
Docebo ID
15
NetForum Committee Code
ACCINFOG
Elevate ID
12546

This program originally aired on November 16, 2022. Please note that the on-demand format of this program is not eligible for CLE/CPD credit.

In order to comply with California and other privacy requirements, many companies are creating data retention policies for the compliant retention and disposition of personal information, only to quickly find that stand-alone data retention policies can conflict with other compliance requirements as well as legitimate business needs. Furthermore, companies are finding out that, once developed, data retention policy execution can be difficult and inconsistent. On this Contoural Webcast, Stacey Shaw, Kerry Childe, Esq. and Mark Diamond will discuss creating a data retention policy that meets privacy requirements, doesn't conflict with other compliance requirements, and is easier to execute, including:


  • Managing conflicts between privacy, records retention and other requirements
  • Developing a business justification process for retaining privacy information to meet legitimate business needs
  • Leveraging your records retention schedule to speed up policy development
  • Designing policies that are both compliant and easier to execute

Generously sponsored by Contoural

image

This program originally aired on November 16, 2022. Please note that the on-demand format of this program is not eligible for CLE/CPD credit.

In order to comply with California and other privacy requirements, many companies are creating data retention policies for the compliant retention and disposition of personal information, only to quickly find that stand-alone data retention policies can conflict with other compliance requirements as well as legitimate business needs. Furthermore, companies are finding out that, once developed, data retention policy execution can be difficult and inconsistent. On this Contoural Webcast, Stacey Shaw, Kerry Childe, Esq. and Mark Diamond will discuss creating a data retention policy that meets privacy requirements, doesn't conflict with other compliance requirements, and is easier to execute, including:


  • Managing conflicts between privacy, records retention and other requirements
  • Developing a business justification process for retaining privacy information to meet legitimate business needs
  • Leveraging your records retention schedule to speed up policy development
  • Designing policies that are both compliant and easier to execute


image

Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:

  • The Five Second Rule – Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
  • A quick review of technologies to automate programs, including technologies that most companies already own today
  • How to delete email, files, and other information quickly and defensibly
  • Combining policies, processes, and technologies to automate records management


Generously sponsored by Contoural

image

Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:

  • The Five Second Rule – Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
  • A quick review of technologies to automate programs, including technologies that most companies already own today
  • How to delete email, files, and other information quickly and defensibly
  • Combining policies, processes, and technologies to automate records management


Generously sponsored by Contoural

image

Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:

  • The Five Second Rule – Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
  • A quick review of technologies to automate programs, including technologies that most companies already own today
  • How to delete email, files, and other information quickly and defensibly
  • Combining policies, processes, and technologies to automate records management


image

Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:

  • How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
  • Creating records management messages that resonate, even for employees that don't care about records management
  • How to handle the 10% of employees who despite training will seemingly never follow records management policies
  • How to audit and remediate ineffective or underperforming program components all while staying compliant.

Generously sponsored by Contoural

image


Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:

  • How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
  • Creating records management messages that resonate, even for employees that don't care about records management
  • How to handle the 10% of employees who despite training will seemingly never follow records management policies
  • How to audit and remediate ineffective or underperforming program components all while staying compliant.

Generously sponsored by Contoural

image


Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:

  • How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
  • Creating records management messages that resonate, even for employees that don't care about records management
  • How to handle the 10% of employees who despite training will seemingly never follow records management policies
  • How to audit and remediate ineffective or underperforming program components all while staying compliant.


Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution:

  • Key steps in records program execution
  • Moving records management from being exclusively owned by legal to a shared responsibility owned and funded by multiple functions
  • Cadillac, Chevy, golf cart or bicycle – determining the right level of program maturity for your company
  • How to avoid from getting stuck, or restarting a stalled initiative
  • Designing a records program so it drives effective privacy, eDiscovery, and employee productivity
  • If and when it's OK to adopt a policy even if has not yet been executed

Generously sponsored by Contoural

image

Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution:

  • Key steps in records program execution
  • Moving records management from being exclusively owned by legal to a shared responsibility owned and funded by multiple functions
  • Cadillac, Chevy, golf cart or bicycle – determining the right level of program maturity for your company
  • How to avoid from getting stuck, or restarting a stalled initiative
  • Designing a records program so it drives effective privacy, eDiscovery, and employee productivity
  • If and when it's OK to adopt a policy even if has not yet been executed

Generously sponsored by Contoural

image
Subscribe to Information Governance Network