We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Articles

Results 1 to 5 of 34
Most popular |Most recent


Adding yet more class to Information Governance (Part 3)

USA - February 18 2016 In this series on defining your company’s information security classifications, we’ve already looked at Protected Information under state PII breach...

European Commission Announces New U.S.-EU Safe Harbor Agreement

USA, European Union - February 2 2016 On February 2, 2016, the European Commission announced a new trans-Atlantic data transfer agreement with the United States. The EU-U.S. Privacy...

James M. Ash, Aaron J. Mann.

Adding more class to Information Governance (Part 2)

USA - January 28 2016 In this series on establishing security classifications for your company’s information, last week’s post looked at one aspect - the widely varying...

Adding some class to Information Governance (Part 1)

USA - January 21 2016 When governing information, it works well to identify and bundle rules (for legal compliance, risk, and value), identify and bundle information (by...

What if companies treated their money like their information?

USA - January 14 2016 I’m here at RabbitHole, Inc., talking with the company’s Manager of Money in his office, which is buried in the Facilities Department, down in the...