The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.
ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.
This program originally aired on November 16, 2022. Please note that the on-demand format of this program is not eligible for CLE/CPD credit.
In order to comply with California and other privacy requirements, many companies are creating data retention policies for the compliant retention and disposition of personal information, only to quickly find that stand-alone data retention policies can conflict with other compliance requirements as well as legitimate business needs. Furthermore, companies are finding out that, once developed, data retention policy execution can be difficult and inconsistent. On this Contoural Webcast, Stacey Shaw, Kerry Childe, Esq. and Mark Diamond will discuss creating a data retention policy that meets privacy requirements, doesn't conflict with other compliance requirements, and is easier to execute, including:
Managing conflicts between privacy, records retention and other requirements
Developing a business justification process for retaining privacy information to meet legitimate business needs
Leveraging your records retention schedule to speed up policy development
Designing policies that are both compliant and easier to execute
This program originally aired on November 16, 2022. Please note that the on-demand format of this program is not eligible for CLE/CPD credit.
In order to comply with California and other privacy requirements, many companies are creating data retention policies for the compliant retention and disposition of personal information, only to quickly find that stand-alone data retention policies can conflict with other compliance requirements as well as legitimate business needs. Furthermore, companies are finding out that, once developed, data retention policy execution can be difficult and inconsistent. On this Contoural Webcast, Stacey Shaw, Kerry Childe, Esq. and Mark Diamond will discuss creating a data retention policy that meets privacy requirements, doesn't conflict with other compliance requirements, and is easier to execute, including:
Managing conflicts between privacy, records retention and other requirements
Developing a business justification process for retaining privacy information to meet legitimate business needs
Leveraging your records retention schedule to speed up policy development
Designing policies that are both compliant and easier to execute
Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:
The Five Second Rule â Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
A quick review of technologies to automate programs, including technologies that most companies already own today
How to delete email, files, and other information quickly and defensibly
Combining policies, processes, and technologies to automate records management
Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:
The Five Second Rule â Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
A quick review of technologies to automate programs, including technologies that most companies already own today
How to delete email, files, and other information quickly and defensibly
Combining policies, processes, and technologies to automate records management
Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:
The Five Second Rule â Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
A quick review of technologies to automate programs, including technologies that most companies already own today
How to delete email, files, and other information quickly and defensibly
Combining policies, processes, and technologies to automate records management
Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:
How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
Creating records management messages that resonate, even for employees that don't care about records management
How to handle the 10% of employees who despite training will seemingly never follow records management policies
How to audit and remediate ineffective or underperforming program components all while staying compliant.
Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:
How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
Creating records management messages that resonate, even for employees that don't care about records management
How to handle the 10% of employees who despite training will seemingly never follow records management policies
How to audit and remediate ineffective or underperforming program components all while staying compliant.
Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:
How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
Creating records management messages that resonate, even for employees that don't care about records management
How to handle the 10% of employees who despite training will seemingly never follow records management policies
How to audit and remediate ineffective or underperforming program components all while staying compliant.
Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution:
Key steps in records program execution
Moving records management from being exclusively owned by legal to a shared responsibility owned and funded by multiple functions
Cadillac, Chevy, golf cart or bicycle â determining the right level of program maturity for your company
How to avoid from getting stuck, or restarting a stalled initiative
Designing a records program so it drives effective privacy, eDiscovery, and employee productivity
If and when it's OK to adopt a policy even if has not yet been executed
Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution:
Key steps in records program execution
Moving records management from being exclusively owned by legal to a shared responsibility owned and funded by multiple functions
Cadillac, Chevy, golf cart or bicycle â determining the right level of program maturity for your company
How to avoid from getting stuck, or restarting a stalled initiative
Designing a records program so it drives effective privacy, eDiscovery, and employee productivity
If and when it's OK to adopt a policy even if has not yet been executed