Log In

News from the IGI

Leveling Up Your IG Program: Opportunities Beyond Best Practices

by Doug Meier - Pandora Media Inc. on September 12, 2017

Information GovernanceIn-House CounselLegal & Industry Education

Whether in “startup” mode or in “recurring initiative” mode, we expect a lot from an information governance (IG) program and its leaders.

For example, the program should follow agreed-upon best practices, like adhering to a maturity model and aligning with the concept of Privacy by Design, and should establish processes like records management and legal hold notification. Likewise, the program leaders are expected to communicate policies and procedures, identify and remove unstructured data debris—including redundant, obsolete, and trivial information (ROT)—and maintain ongoing IG efforts.

These are all admirable goals and objectives, but it’s not enough. For an information governance program to survive, it requires alignment with and embracement of objectives that go beyond best practices and standard guidance. Here are a few ways to level up your IG program.

To read the article in full, head over to Relativity's blog by clicking here.


Join the IGI at Relativity Fest, October 22 – 25 in Chicago

Find Out How to Put IG into Action

Join the IGI at Relativity Fest, October 22 – 25 in Chicago, for actionable takeaways to build a winning IG program and gain quick insights into your data with analytics tools.

Save $200 by using the code "RF17IGI" when you register.*



Make sure to check out these sessions hosted by the IGI:

What Made Pandora Finally Hear the IG Music: Barclay T. Blair, founder and executive director of IGI, and Doug Meier, director of information governance, risk and compliance at Pandora, will share how Pandora reduced data storage costs and e-discovery risks with an IG program.

Lawyering in the Information Age: Analytics Success Stories Using Relativity: Bennett B. Borden, founder and chair of IGI, and Dean Gonsowski, VP of business development at Relativity, will share stories and guidance about successfully leveraging analytics tools.

*The discount code is available for new registrants only.


Join IGI & Actiance for an Executive Briefing

Thursday, October 12th, 11:30am - 1:30pm
London Chop House, Detroit


Join us for lunch with eDiscovery expert Barclay Blair of the Information Governance Initiative (IGI) for an interactive discussion of how social media, voice, mobile, and messaging apps are changing eDiscovery.

RSVP now and learn:

  • How to capture and preserve these new forms of communications like WeChat and WhatsApp, among others
  • How you can improve alignment of legal, IT, and other stakeholders in evaluating potential litigation risks
  • How Actiance can help you meet your eDiscovery obligations with confidence



Barclay Blair - Founder & Executive Director, Information Governance Initiative (IGI)

Barclay T. Blair is a consultant to Fortune 500 companies and government institutions, and is an author, speaker, and internationally recognized authority on a broad range of policy, compliance, and management issues related to information governance technology.


Michael Rutty - Subject Matter Expert (SME), Actiance

Michael Rutty is a Subject Matter Expert for Information Archiving for Actiance. Previously, Michael was Technical Evangelist at Varonis Corporation, focusing on Data Governance and Cyber Security. He has served in similar capacities at Autonomy/HP, CommVault, and Veritas/Symantec.


New Data: Employee Data Habits May Increase Corporate Legal Risk

By David Horrigan

This article originally appeared on Law360.

In our daily work lives, we see a fair amount of anecdotal evidence indicating many of us engage in workplace behaviors that put our personal privacy and company data at risk.

But, how serious is the problem?

To find out, kCura recently commissioned a Harris Poll survey conducted between December 28, 2016, and January 18, 2017, included 1,013 U.S. adults age 18 and over who were employed full-time or part-time, working in a traditional office setting for at least 50 percent of the time (referred to as “employees” throughout) to get a better idea of just what employee behaviors may be putting corporate enterprises—and themselves—at risk.

To those of us who work in e-discovery law, the results probably come as little surprise. The news for the corporate enterprise is somewhat ominous: the era of big data for employees could lead to big risk for employers.

In this article, David Horrigan digs deep into the Harris Poll results, addressing aspects such as:

Phantom Policies and Procedures
Employee-grown Data
Personal Privacy and Legal Liability
Why the Survey Conducted by Harris Poll Matters


To read the article in full, click here to head over to the Relativity Blog.


Method statement: This survey was conducted online in the U.S. by Harris Poll on behalf of kCura, makers of Relativity, between December 28, 2016 and January 18, 2017. The research was conducted among 1,013 adults age 18+ who are employed full-time or part-time, not a freelancer, and works in a traditional office setting for at least 50% of the time. Figures for age, gender, race/ethnicity, education, region, and household income were weighted where necessary to bring them into line with their actual proportions in the population. Propensity score weighting was also used to adjust for respondents’ propensity to be online.

David Horrigan is the e-discovery counsel and legal content director at Relativity. An attorney, law school guest lecturer, e-discovery industry analyst, and award-winning journalist, David has served as counsel at the Entertainment Software Association, reporter and assistant editor at The National Law Journal, and analyst and counsel at 451 Research.


Survey Says: Analytics Making In-house a Home

by Dean Gonsowski

In January, members of the World Economic Forum met at their annual Davos summit to discuss analytics, automation, and artificial intelligence (AI), topics with enough potential to have global business leaders expressing both optimism and fear:

"It's not like we actually have economic growth today. So we actually need technological breakthrough, we need AI ... Our responsibility is to have the AI augment the human ingenuity and augment the human opportunity." Satya Nadella, Microsoft CEO

“I think now about how artificial intelligence will create digital refugees and how people will be displaced from jobs, tens of millions of people across the planet, because technology is moving forward so rapidly ... So companies, individuals have to decide: are we going to be committed to improving the state of the world? We’re at a crucial point right now.” - Marc Benioff, Salesforce CEO

These technologies are shaping our world quicker than experts expected, but the critical question remains: Will this trend significantly reshape the legal profession?

The short answer—as we’ve highlighted before—is yes.

For the second year in a row, the Coalition of Technology Resources for Lawyers (CTRL) and the Information Governance Initiative(IGI) teamed up to survey internal legal departments about their current and anticipated adoption of advanced analytics.

The findings? In line with last year’s study, and perhaps not surprisingly, analytics adoption is accelerating and practitioners are more bullish than ever.

To read the rest of the 'Survey Says: Analytics Making In-house a Home' article on Relativity's blog, click here.



Information Security & Information Governance – how they work together

By Richard Kilpatrick - Information Technology & Services

Richard Kilpatrick is a highly experienced consultant in information technology, focusing on realistic data governance, security and privacy.  Richard has led programs of work to discover and classify data across multiple business units, within banks, telcos, health and media. In this Information Governance ANZ article, he outlines the difference between Information Security and Information Governance, explaining why IG frameworks are essential for the successful orchestration of specialized security systems.

Information (data) security, cybersecurity and IT security all usually refer to the protection of computer systems and information assets by suitable controls, such as policies, processes, procedures, organizational structures and software and hardware functions. The type and extent of controls depends on the scope and maturity of the business function (usually the Security Department) applying the controls, or, depends on the specialization/focus of the team, such as Perimeter/Firewall or Identity Management. Each function tends to have a different perspective of information security, compared to other functions, due to their focused specialization.

A close parallel is the health profession. You see a GP doctor when unwell, and are referred to a specialist who knows much more than your GP about a particular field of expertise. I know that my GP would not want to perform open heart surgery at all. And equally, a heart specialist would not have up-to-date and practical knowledge of all areas of the body. Tinea treatment? – see somebody else please.

In other words, people specialize in a particular aspect of their work. You can’t be an expert in everything. People prioritize – for example, in busy times, a SysOp will not be as vigilant with security when their primary role is to keep the sales /finance system up and running for all users. This is exactly how Information Security Systems operate.

To read the rest of 'Information Security & Information Governance – how they work together' head over to the original article on Information Governance ANZ.