IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 2)

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 
E-mail

www.contoural.comHow Long Should Email Be Saved?

As email has become more critical in the business world, many companies are weighing the question of how long it should be retained, what should be done with it, and when it should be deleted. The answer depends on many issues, particularly when one considers the varying regulations and business situations that might demand emails to be archived for long periods of time.

Read more...
 
E-mail

Legal Industry Survey Reveals Big Deficits in eDiscovery Readiness

A new survey of legal professionals reveals that 90% of in-house counsel believes their companies are largely unprepared for legal discovery. Get full survey results and best-practice recommendations to uncover where potential gaps exist. Identify the biggest opportunities to proactively prepare for discovery requests and improve outcomes by utilizing an outsourcing strategy.

Read more...
 
E-mail

Email Archiving & Compliance Solutions for mid-sized organizations

Small and Mid-market customers struggle to meet ever mounting e-mail archiving requirements and associated compliance demands - often with a limited I/T staff and within strict budgetary guidelines.

Read more...
 
E-mail

Protecting Sensitive Information in an Increasingly Leaky World

Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business' brand value, stakeholder confidence, risk management strategies, and compliance status.

Read more...
 
Page 3 of 9

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner