All Session Times Below are Listed in EDT
Followers of the red hot Big Data trend know that the 3 Vs (Volume, Variety and Velocity) have converged to present an opportunity for advanced analytics. But, this same data that may be leveraged for corporate value has risks due to potential eDiscovery costs, privacy regulations, security breaches, storage requirements and the like. Organizations are beginning to align content creation with categorization and then defensible disposal to efficiently “govern” their data, before the data effectively becomes unmanageable.
In this webcast industry experts discuss how to build a business case for effective information governance, with emphasis on calculating the necessary risk and value elements as part of a compelling ROI (return on investment) analysis.
Speakers: Conor R. Crowley, Esq., CIPP/US/ECrowley Law Office
Dean GonsowskiAssociate General Counsel and Senior Director of Business DevelopmentRecommind
Today’s in-house legal departments, in addition to managing all legal aspects of their company, are often expected to operate like other business units, specifically including the management of vendors, monitoring progress against budgets, production of performance metrics, and distribution of data-based reports to management. Incorporating these once “business only” aspects can be tricky unless you have a firm grasp on effective project management techniques and are able to communicate them effectively to your team, both internal and with outside counsel. An effective legal business unit produces better legal work for a lower cost – and can measure its progress with metrics. This session will outline how to realistically combine the legal and business aspects of your job by:
The Internet has transformed the practice of law, but few lawyers understand how privacy laws impact them and their clients. This presentation will highlight specific ethical considerations for the practice of law regarding attorney-client privilege. All clients and lawyers rely on Social Media as a means of sharing information and communicating, but with little consideration of the privacy laws. Today’s label to describe employees’ use of their personal cell phones, tablets, and laptops is BYOD (Bring Your Own Device). Since employees conduct company business on these personal devices with little concern for legal implications BYOD is fraught with a myriad of complex legal issues, including attorney-client privilege.
Speaker: Peter S. Vogel, Partner , Gardere Wynne Sewell LLPandAdjunct Professor of Law, SMU Dedman School of Law, Dallas
UPDATED TOPIC:Proportionality has been touted by industry cognoscenti as the bridge over the chasm of troubling eDiscovery disputes. Despite the hype, many doubt that proportionality can prevent courts, clients or counsel from plummeting into the abyss of spiraling costs and lengthy delays that often characterize discovery. For example:
UPDATED SPEAKERS:Moderator: Philip Favro, Discovery Counsel, Symantec CorpPanelists: Shawn Cheadle, Esq., General Counsel, Military Space, Lockheed Martin Space Systems Co.Hon. Frank Maas, United States Magistrate Judge, Southern District of New YorkAriana J. Tadler, Esq., Partner, Milberg LL
The emergence of the term “information governance” has given a new name to a long-present issue – how do organizations effectively, efficiently and appropriately utilize their information throughout its lifecycle? The rise of information governance reflects the principle challenge that for information to be valuable it must be managed and controlled through policy, process and practice. The development of these information policies, processes and practices, in the end, must be pragmatic and must address the legal risks (and business needs and decision-making structure) of the organization. This presentation will provide an overview of the core principles of a practical information governance program and will show how such a program can assist in addressing key legal risks associated with corporate information, including:
Speaker: Andrew J. CosgroveSenior AttorneyRedgrave LLP
The U.S. has stepped up their critical information infrastructure to allow for more sharing of cyber threat information between government and private companies to better detect and prevent attacks. This vital information sharing targets in-house counsel, especially those who have indicated that their companies had experienced a cybersecurity breach in the last 12 months. In particular, corporations need to prepare for the inevitable compromise of their information from cyber intruders. This session will discuss strategies that companies can use to better respond to incidents:
Speakers: Art EhuanManaging Director, Forensic Technology ServicesAlvarez & Marsal Global Forensic and Dispute Services
Renée A. Miller-Mizia, Esq.Managing DirectorAlvarez & Marsal Global Forensic and Dispute Services, LLC
© Copyright 2012. ALM Media Properties, LLC. All rights reserved.