Peer to Peer Magazine

Winter 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/624538

Contents of this Issue

Navigation

Page 19 of 71

For example, a generic company newsletter designed to be distributed publicly could be determined immediately not to have any e-discovery or cybersecurity value and have a short retention policy applied to it. Develop a Defensible Data Disposal Policy. Some of the biggest risks organizations face are that data will be used against them in litigation or that private, protected information will be released to the general public. Creating a defensible disposal policy on data that have no long-term value or that are not required to be maintained can help law firms immediately mitigate those risks. Create a Post-Breach Document Review Strategy. Document review is not just for e-discovery and litigation. A good data management plan will also have a post-breach document review strategy. This review will determine the importance of the documents breached and how severe the breach was. Obtain Third-Party Expertise. Experts spend all day working on data management plans, e-discovery processes and cybersecurity responses. Companies should embrace these third-party experts as helpers in creating a data management culture. Data management can no longer be separate from other business responsibilities. It must become an integrated component of a law firm's culture. Using these nine steps, you can integrate information governance frameworks with e-discovery while ensuring data security, creating good data management. 7 8 9 WWW.ILTANET.ORG 21 Whatcha Readin'? The ILTA community is filled with avid readers. Here are some recent recommendations. The Sketchnote Workbook: Advanced Techniques for Taking Visual Notes You Can Use Anywhere by Mike Rohde "The Sketchnote Workbook" is an interesting take on what seems like a boring topic: how to take notes. The author presents how making pictures and font changes throughout your note-taking makes your notes more valuable. The variations help you retain knowledge and allow you to quickly look back and reflect on the meeting for which you were taking notes. And given the entire book is made up of sketch notes, it's a fairly quick read. Chad Conrow Perkins Coie Red Notice: A True Story of High Finance, Murder, and One Man's Fight for Justice by Bill Browder A financial caper, a crime thriller and a political crusade, "Red Notice" is the story of one man battling overpowering odds to change the world. It is also the story of how, without intending to, he finds meaning in his life. David Michel Broad and Cassel Good to Great: Why Some Companies Make the Leap... And Others Don't by Jim Collins This book dives into how good companies become great companies and what sets them apart from the competition. "Good to Great" is not geared toward technology, and many of the companies listed as being "Built to Last" are no longer in existence, but there are some gems of wisdom for anyone looking to take their IT department from good to great! John Jelderks Barack Ferrazzano Kirschbaum & Nagelberg LLP Crucial Conversations: Tools for Talking When Stakes Are High by Kerry Patterson, Joseph Grenny, Ron McMillan and Al Switzer I was listening to a gentleman speak about leadership at a recent conference, and he noted that he asks anyone he hires to read this book. As I got into reading it, I understood why. Communication is such an important factor to having an effective team and being productive. It is an invaluable skill to know the right questions to ask and why. No matter your role, this book will be a helpful resource. Brian Susol Lando & Anastasi LLP

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2015