Summary
It is axiomatic that the volumes of electronically-stored information (ESI) generated by organizations are vast and ever-increasing. Correspondingly, the amount of ESI that must be preserved, collected, processed, and reviewed for internal investigations, active litigation, and regulatory compliance never stops growing. Today, it is a practical and ethical requirement for practitioners in these areas to take the necessary steps to protect the ESI they are managing for those purposes, which means keeping up with evolving security and compliance best practices – as well as adapting to the rapidly changing tactics to threat actors. In this practice guide, we will discuss why ESI must be protected and how you can protect it, including fundamentals of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.
In this Practice Guide
- The relative merits of common security compliance frameworks
- The pros and cons of cloud and on-premises storage environments
- The essential need for data encryption at rest and in transit
Key Insights
- The need for everyone to contribute to data protection
- The critical importance of role-based access control
- The need to adapt to evolving threat tactics
Practice Guide Download
About the Authors
From the author
Keeping Control of Critical Data When Key Employees Depart
Summary Losing a key employee is never easy. They often take with them institutional knowledge, important relationships, and critical skill sets. All this is enough of a challenge, but if they also take
Measuring Success: Corporate Counsel Guide to Metrics-Based Management
The metrics-tracking legal department gains actionable insights that it can apply not only to internal operations but also to broader, corporate-wide assessments that impact decision-making.