By: Editorial Staff, Date: November 4th, 2021

In today’s era of technological advances, adopting a data-driven culture in an organization may be a good starting approach to a sound IG program. While this would entail commitment from all levels of the organization, all too often, it is a powerful spur that brings an IG program straight to its goal – compliance and robust decision-making across company size.

Across data sources, information speaks volumes. That is why treating a company’s information as a valuable asset is equally rewarding as having a doable framework of IG policies and strategic governance. Transforming a company’s information into the linchpin of a business rightfully serves the purpose of information governance to some extent.

But what type of data sources do you have in place? In the survey conducted by the Association of Corporate Counsel (ACC) and Pagefreezer, a sweeping percentage shows IT reliance in terms of data retention and preservation in various data sources including cloud-based email clients, internal messaging, website content, social media, texting/instant messaging apps, etc. However, a swift progression showing less involvement from the IT department is taking place.

In the long run, what matters most is fast access to information when the process of eDiscovery is involved. So why take risks? Getting everyone involved and committed may be the key to laying out the best IG practices. Most arguably, implementing a good IG program is more than lip service.

Click on the link for more of this insightful survey report.

Target readers are those involved in litigation, data privacy, and information security, technology professionals, and those who have an interest in Information Governance (IG)

Upcoming Webcasts


Mitigating Third-Party Risk in the Digital Supply Chain: Best Management Strategies Explored

Digital supply chain is currently gaining prominent recognition due to its greater versatility as compared to traditional supply chains. Because cybersecurity risks and third-party attacks have skyrocketed at an alarming rate, more businesses now prefer the digital way. However, cyber-related supply chain threats are always almost impossible to prevent. As businesses seek to leverage the potentials of this growing tool, new challenges also start to emerge.