Category: Information Governance

Compliance, GDPR, Information Governance, PII

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats and brainwaves, but it also …

2 min read
What Is Data Discovery and Why Should I Use It?
Blog Posts, Compliance, Information Governance, Law

Streamlining the Serious Business of Due Diligence

Streamlining the Serious Business of Due Diligence Although the concept of “due diligence” has become widely accepted as any painstakingly detailed process of investigating and verifying the validity of a fact or situation, the phrase takes on a more profound level of meticulous research when used in the context of the legal profession. In other …

3 min read
Streamlining the Serious Business of Due Diligence
Blog Posts, classification, Information Governance, virtual data rooms

3 Reasons You Need a Virtual Data Room

3 Reasons You Need a Virtual Data Room The top performing businesses in 2016 will perfect the art of connection — in fact, this economy has been labeled the Connection Economy. Consider the largest “taxi company” doesn’t own a car (Uber); the largest “hotel chain” doesn’t own a building (AirBnB); and the largest “media company” …

3 min read
3 Reasons You Need a Virtual Data Room
Blog Posts, Information Governance, Law, Security

Attorneys: Is Your Information Governance Rock Solid?

Attorneys: Is Your Information Governance Rock Solid? Great architecture begins with a rock-solid foundation. Builders envision elaborate structures, but when the foundation is not firm, trouble is sure to follow. At best, a building leans; at worst, it completely topples over. In the Information Age, businesses, especially law firms, don’t depend on brick and mortar …

3 min read
Attorneys: Is Your Information Governance Rock Solid?
Blog Posts, ECM, Information Governance, Privacy, Security

How to Target Security in Your ECM

How to Target Security in Your ECM Role-Based Access Can Simplify and Strengthen ECM Security Congratulations—your organization has adopted a much-needed, corporate-wide mandate to implement an Enterprise Content Management (ECM) system. Your mission, which you are happy to undertake, is to deal with all the issues that you face everyday using a file share or …

3 min read
How to Target Security in Your ECM