Article: Handling Structured Data in Discovery

By: Philip Favro and Gregg Parker, Principal Consultants Much of the focus of electronic discovery in recent years has centered on preserving and obtaining text messages and workplace collaboration content. And yet, there are other key sources of ESI that are often overlooked and may be more significant for claims and defenses than digital age communications. Structured data is one … Read More

Privacy Happenings – April 2022

In Case You Missed It:  This Month’s Privacy Topics Sanity: Implement a Privacy Framework For privacy professionals attempting to implement privacy and data security programs, it’s a tumultuous journey.  Existing regulatory requirements are changing – consider the amendments made to the CCPA by the CPRA and those recently passed for the VCDPA.  New US state or country laws continue to … Read More

How to Build a Sound Data Security Plan: 5 Key Principles

By Linda Coniglio, Director of Privacy and Information Governance Most organizations keep sensitive personal data such as names, Social Security numbers, credit card, or other account data in unstructured data sources — considered by many the least protected data sources in an organization.  This sensitive personal data is often necessary to fill orders, meet payroll, or perform other business functions.  … Read More

Image depicting organized computer data or organized file archi

An Introduction to Data Cleanup

By: Linda Coniglio, Information Governance and Privacy Specialist, CIPP/US There is a term that’s used to describe the large, hard-to-manage volumes of data – both structured and unstructured – that inundate organizations on an increasing basis – Big Data. As evidenced by the growth of data in the world and the variety of sources creating that data, Big Data has … Read More

February 2022 Privacy Newsletter

Spotlight: How to Implement and Maintain a Privacy Compliance Program We live in the era of Big Data and, according to estimates, the volume of business data worldwide, across all companies, doubles every 1.2 years. Unlike oil, which is a precious resource of limited availability, data is voluminous – in fact, organizations are drowning in data, and many have unwittingly … Read More

Image of secure online shopping.

Be a Data Privacy Champion

By Linda Coniglio, Director, Privacy and Information Governance Data Privacy Week aims to inspire dialogue and empower individuals and companies to take action. Data Privacy Week is an international effort to empower individuals and businesses to respect privacy, safeguard data, and enable trust! In consideration for Data Privacy Week, we are emphasizing the importance of protecting your privacy when shopping … Read More

Closed lock image representing secure data and data privacy

Innovative Driven Announces Commitment to Respecting Data by Becoming a 2022 Data Privacy Week Champion

This year’s initiative emphasizes educating businesses on data collection best practices that respect data privacy and promoting transparency. Falls Church, VA & Arlington, VA (January 24, 2022) — Innovative Driven (ID) today announced its commitment to Data Privacy Week by registering as a Champion. As a Champion, Innovative Driven recognizes and supports the principle that all organizations share the responsibility … Read More

information governance

Info Gov 101: What is Information Governance & Why it is Critical for Your Organization?

Linda Coniglio, Director of Privacy & Information Governance Information governance (IG) is a framework for managing data by establishing policies & procedures for how information is created, stored, used, valued and deleted. It encompasses the policies, standards, processes, metrics, and roles guiding the efficient and effective use of information for your organization to realize its objectives. An important goal of … Read More

What Litigants Should Know About New Court Decisions on Categorical Privilege Logs

By: Philip Favro, Consultant, IG and eDiscovery Parties are turning to privilege log alternatives like metadata logs, categorical logs, and logs reflecting samples of privileged documents to ameliorate the burdens of preparing document-by-document logs. As they do so, courts have in turn issued several recent opinions that provide guidance for how parties should handle the development of these logs, particularly categorical logs. That guidance … Read More

Data Governance Is the First Line of Cyber Defense

By: Nate Latessa, VP of Corporate Services Since 2003, October has been recognized as National Cyber Security Awareness month. It’s a collaboration between the US Department of Homeland Security and the National Cyber Security Alliance and intended to raise awareness for staying safe and secure online. Cybersecurity month focuses on 5 main topics:• Every digital user should know how to … Read More