Information Governance

As the volume of information grows exponentially year-on-year, and the manner and availability of the information morphs on a near-monthly basis, the risks associated with substandard or nonexistent strategic Information Governance—the coordinated management of the information lifecycle within and without the client firewall—grow as well.

Mature concerns associated with data security, Personally Identifiable Information (PII), Protected Health Information (PHI), Intellectual Property, and E-Discovery obligations have now joined forces with the risks associated with, among others, cloud storage, social media sharing, the viral adoption of “Shadow” IT by client officers and employees, and legacy stockpiles of information with unknown provenance. The repercussions have magnified as well, with recordkeeping compliance penalties, E-Discovery sanctions, and costs associated with data privacy and security breaches sounding more frequently. Client representatives tasked with compliance duties in the Information Governance space, as well as with strategic planning related to IT asset implementation and future information, need expert advice based on industry benchmarking but tailored to specific client needs and direction. BakerHostetler is here to help.

Information and its use is the ultimate mixed blessing for client organizations. Future success depends on intelligent use of information, but the governance of that information is undergoing a dramatic and unprecedented change. BakerHostetler’s experienced Information Governance professionals work carefully to understand clients’ Information Governance profiles, and tailor solutions specific to clients’ specific needs, risk tolerances, and regulatory and industry footing. The core of the practice focuses on assisting clients in navigating changing Information Governance paradigms, reducing risk and cost, and positioning clients for future success.

Strategic Advice

BakerHostetler provides clients with organizational-level advice, providing enterprise-wide consistency, compliance with regulatory and legal requirements, and prospective guidance that evergreens for year-on-year success even with often drastic technological and client compositional change. Advice must begin with understanding, and BakerHostetler’s combined interview and investigative approach first shows clients where they stand on Day One before providing strategic alternatives to address current and future risks and concerns.

More »
Information Management—Technology & Solutions

BakerHostetler professionals assist clients with the selection and retention of technologies and services that fit client needs and risk tolerances. Information Governance professionals work hand-in-hand with clients and BakerHostetler’s Information Technology and Transactions team to develop requests for proposals (RFPs); select appropriate vendors and technological solutions; and execute appropriate contractual and procedural safeguards for the use of those solutions.

Information Use—Policies and Schedules

BakerHostetler advises clients on enterprise-wide Information Governance Policies and Schedules, and assist with the creation and modification of those Policies as well as the maintenance and overhauling of related Schedules. Proper policies and schedules provide client officers and employees with appropriate instructions for handling personal and client information, a standard to measure against audit and improvement initiatives, and a foundation upon which a client can add new internal technologies and processes.

Prospective Corporate Activity

BakerHostetler provides a component of client due diligence in the context of mergers, acquisitions, asset purchase, and divestitures to extract information of value; to assist the client in complying with existing and incipient legal hold requirements; and to cost-effectively harmonize information to existing or contemplated Information Governance Policies and Schedules.

Corporate Audit

BakerHostetler assesses and audits client Information Governance practices to ascertain gaps associated with proper information management, security, and client contractual obligations. Where appropriate, BakerHostetler may undertake efforts to address challenges directly, or assist the client with overseeing more involved compliance projects.

Legacy Remediation

BakerHostetler analyzes client information use and legacy remediation projects in the context of clients’ Information Governance Policies and Schedules, existing legal hold requirements, internal informational data analytic initiatives, and risk tolerances. Based on that analysis and client direction, we supervise the appropriate disposal of unneeded information, as well as the proper categorization of any retained information and the intelligent use of that information through new technologies and processes.

Expert, Officer and Employee Training

BakerHostetler assists clients with the identification and preparation of 30(b)(6), state analogue, and other expert and client-representative witnesses in the context of client Information Governance practices. Likewise, we train client officers and employees on the proper operation of Information Governance Policies and Schedules and their intersection with data privacy, data security, and E-Discovery issues.

Special Projects

Multinational clients demand additional expertise and varied experience. BakerHostetler’s multidisciplinary professional teams assist clients in addressing cross-discipline Information Governance projects that also involve data privacy, data security, E-Discovery, and information analytics issues.

Key Contacts

Blog

In The Blogs

Previous Next
Data Privacy Monitor
Privacy and Data Protection Team Partner Craig Hoffman Named as a “Rising Star” by Law360
April 7, 2015
Congratulations to Craig Hoffman, a partner and member of our Privacy and Data Protection team, who has been selected by Law360 as a Rising Star in the area of Privacy. Law360 editors reviewed a record 1,200 submissions to determine the...
Read More ->
Data Privacy Monitor
Obama Administration Recognizes Cyber Threats to U.S. Critical Infrastructure as a National Emergency
April 7, 2015
Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects formal recognition that, regardless of...
Read More ->
Discovery Advocate
James Sherer Discusses Cross-border Bring Your Own Device (“BYOD”) eDiscovery and Data Privacy Issues
April 7, 2015
Counsel James Sherer, co-leader of BakerHostetler’s Information Governance team, sat down with Kroll Ontrack’s Michele Lange and Eric Robinson for a Legal Talk Network ESI Report on 2015 Trade Shows and Trends in E-Discovery.  Sherer...
Read More ->
Data Privacy Monitor
Wyoming Broadens Data Breach Notification Law
April 2, 2015
Wyoming recently joined the list of states passing laws that broaden the scope of their data breach notification laws. On March 2, 2015, Wyoming signed into law two bills (S.F. 35 and S.F. 36) that expand the definition of personally...
Read More ->
Data Privacy Monitor
Bring Your Own Device (Everywhere): Legal and Practical Considerations for International BYOD Programs
March 30, 2015
The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges for...
Read More ->