Remove 2012 Remove 2020 Remove Information governance Remove Security
article thumbnail

Revisiting Our Views on Non-Compliance with IM Policy

ARMA International

Take a situation where we (IM professionals) are not fully complying with a security policy. In some cases we’re in a hurry and don’t have time to go through all the hoops that the security team wants us to go through. 1] A great book on this subject is David McRaney’s You Are Not So Smart , 2012 Penguin Publishing Group.

article thumbnail

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Upon completing this session, you will be able to: Highlight the need for a multi-disciplinary approach for transformative information governance projects. Meal, Partner, Ropes & Gray LLP, Christopher Sitter, Information Security Director, Forensic Technology, Juniper Networks, Matthew Todd, Ph.D.,

article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 social security and credit card numbers, employee and patient health data, and customer financial records).”43

Privacy 94