What do clients think about law firm IG?

Slides:



Advertisements
Similar presentations
AUDITING : AN OVERVIEW. Auditing defined It is a critical and systematic examination or review of accounting reports, documents, records, procedures and.
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Code of Ethics for Professional Accountants
Steps to Compliance: Managing Business Associates PRESENTED BY.
Audit and Assurance services
Discussion on SA-500 – AUDIT EVIDENCE
Steps to Compliance: Bring Your Own Device PRESENTED BY.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Developing a Records & Information Retention & Disposition Program:
Module A1 Other Public Accounting Services ACCT 4080.
ISO 17799&ITS APPLICATION Prepared by Çağatay Boztürk
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Copyright Security-Assessment.com 2004 Security Governance and Regulatory Controls by Peter Benson.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Managing Records in SharePoint Step 1: Develop Retention Rules that Work.
First Practice - Information Security Management System Implementation and ISO Certification.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Steps to Compliance: Risk Assessment PRESENTED BY.
Fiscal Compliance for Department Heads & Directors Daniel Adams Audit Services.
Chapter Nine Conducting the IT Audit. Audit Standards AICPA — Statements of Auditing Standards (SASs) AICPA — Statements of Auditing Standards (SASs)
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Data Protection in Financial Services Are you Seeing the Bigger Picture? 17 September 2008.
Evolving IT Framework Standards (Compliance and IT)
Merchant Banking.
GRC - Governance, Risk MANAGEMENT, and Compliance
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Implementing and Auditing Ethics Programs
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
M a k i n g w o r k e r s ’ c o m p w o r k ® Content Management & Records Retention “A RIM Perspective” Nancy M. Maglothin, Records and Information Manager.
ALEX STEWART INTERNATIONAL’S CODE OF PROFESSIONAL CONDUCT.
Balancing Transparent Access to KM with Client Security, Confidentiality, Risk and Compliance #INFO14 August 25, 2011.
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2000 Certified Company This document is the property of and proprietary to.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
1 PARCC Data Privacy & Security Policy December 2013.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Records Management and E- Discovery Nebraska Secretary of State – Records Management Division – November 8, 2007.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
ISO CONCEPTS Is a management standard, it is not performance or product standard. The underlying purpose of ISO 1400 is that companies will improve.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
Minimizing Risk and Cost Exposure through Information Governance January 28, 2015 Moderator: Christopher Johnson, Director of Technology and Integrated.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
What standards, relevant to me, are there? Barbara Reed Chair, Standards Australia IT 21 Committee on Records and Document Management Systems.
THE PROGRESSION OF THE ROLE AND FUNCTIONS OF H.I.M PROFESSIONALS.
Law Firm Data Security: What In-house Counsel Need to Know
An Information Security Management System
QUALITY ASSURANCE.
Preparing for Investigations
Data Minimization Framework
IIASA Governance Review
Learn Your Information Security Management System
Information governance: Blind men, meet your elephant
Deana Uhl Senior Director – Technology,
The views expressed are the personal views of the presenter and do not reflect those of the PCAOB, members of the Board, or the PCAOB staff.
Michael Brauneis Managing Director Chicago Office
DISCUSSION ON IMPLEMENTATION ON DCS TURNAROUND STRATEGY THEMES
Information Governance
توانمند سازی ممیزی با رویکرد IT GRC در گروه شرکت‌های مپنا
Tips on Privacy Audits and Assessments Insurance Consumer Affairs Exchange October 2, 2005 Kirk Herath, CPO & Associate General Counsel, Nationwide Insurance.
Exclusive Field of Use Licensing
Michael J. Bridwell John F. Kuckelman
Rapid Fire Panel.
Tools & Approaches for Ongoing Privacy Compliance
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Managing Compliance Early: System Development
Leaving the Paper Paradigm Behind
UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT Topic 5.
Audit.
Presentation transcript:

What do clients think about law firm IG? January 13, 2014

Speakers Teresa Britton, Exelon Stephan Eberle, Silicon Valley Bank Tom Morrissey, Purdue Pharma Gillian Glass, Farella Braun + Martel LLP gglass@fbm.com The views and opinions expressed by the panel members are based on their expertise of the subject matter and do not constitute official positions or reflect specific business practices of their company or firm.

Information Governance Definitions Information governance is the activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs.  Source: Information Governance Initiative Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. Source: Gartner We believe that IG contains multiple facets that must be part of the conversation, including, at a minimum: Information security Data science Electronic discovery Business management Compliance Business intelligence Analytics Records management Finance Audit Privacy Risk Management IT and Infrastructure Management Source: Information Governance Initiative

Security

ISO 27001 The ISO 27000 family of standards helps organizations keep information assets secure. Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties. ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS). http://www.iso.org/iso/home/standards/management-standards/iso27001.htm

Storage

Privacy

Outside Counsel Guidelines

Retention / Disposition