Information Governance

As the volume of information grows exponentially year-on-year, and the manner and availability of the information morphs on a near-monthly basis, the risks associated with substandard or nonexistent strategic Information Governance—the coordinated management of the information lifecycle within and without the client firewall—grow as well.

Mature concerns associated with data security, Personally Identifiable Information (PII), Protected Health Information (PHI), Intellectual Property, and E-Discovery obligations have now joined forces with the risks associated with, among others, cloud storage, social media sharing, the viral adoption of “Shadow” IT by client officers and employees, and legacy stockpiles of information with unknown provenance. The repercussions have magnified as well, with recordkeeping compliance penalties, E-Discovery sanctions, and costs associated with data privacy and security breaches sounding more frequently. Client representatives tasked with compliance duties in the Information Governance space, as well as with strategic planning related to IT asset implementation and future information, need expert advice based on industry benchmarking but tailored to specific client needs and direction. BakerHostetler is here to help.

Information and its use is the ultimate mixed blessing for client organizations. Future success depends on intelligent use of information, but the governance of that information is undergoing a dramatic and unprecedented change. BakerHostetler’s experienced Information Governance professionals work carefully to understand clients’ Information Governance profiles, and tailor solutions specific to clients’ specific needs, risk tolerances, and regulatory and industry footing. The core of the practice focuses on assisting clients in navigating changing Information Governance paradigms, reducing risk and cost, and positioning clients for future success.

Strategic Advice

BakerHostetler provides clients with organizational-level advice, providing enterprise-wide consistency, compliance with regulatory and legal requirements, and prospective guidance that evergreens for year-on-year success even with often drastic technological and client compositional change. Advice must begin with understanding, and BakerHostetler’s combined interview and investigative approach first shows clients where they stand on Day One before providing strategic alternatives to address current and future risks and concerns.

More »
Information Management—Technology & Solutions

BakerHostetler professionals assist clients with the selection and retention of technologies and services that fit client needs and risk tolerances. Information Governance professionals work hand-in-hand with clients and BakerHostetler’s Information Technology and Transactions team to develop requests for proposals (RFPs); select appropriate vendors and technological solutions; and execute appropriate contractual and procedural safeguards for the use of those solutions.

Information Use—Policies and Schedules

BakerHostetler advises clients on enterprise-wide Information Governance Policies and Schedules, and assist with the creation and modification of those Policies as well as the maintenance and overhauling of related Schedules. Proper policies and schedules provide client officers and employees with appropriate instructions for handling personal and client information, a standard to measure against audit and improvement initiatives, and a foundation upon which a client can add new internal technologies and processes.

Prospective Corporate Activity

BakerHostetler provides a component of client due diligence in the context of mergers, acquisitions, asset purchase, and divestitures to extract information of value; to assist the client in complying with existing and incipient legal hold requirements; and to cost-effectively harmonize information to existing or contemplated Information Governance Policies and Schedules.

Corporate Audit

BakerHostetler assesses and audits client Information Governance practices to ascertain gaps associated with proper information management, security, and client contractual obligations. Where appropriate, BakerHostetler may undertake efforts to address challenges directly, or assist the client with overseeing more involved compliance projects.

Legacy Remediation

BakerHostetler analyzes client information use and legacy remediation projects in the context of clients’ Information Governance Policies and Schedules, existing legal hold requirements, internal informational data analytic initiatives, and risk tolerances. Based on that analysis and client direction, we supervise the appropriate disposal of unneeded information, as well as the proper categorization of any retained information and the intelligent use of that information through new technologies and processes.

Expert, Officer and Employee Training

BakerHostetler assists clients with the identification and preparation of 30(b)(6), state analogue, and other expert and client-representative witnesses in the context of client Information Governance practices. Likewise, we train client officers and employees on the proper operation of Information Governance Policies and Schedules and their intersection with data privacy, data security, and E-Discovery issues.

Special Projects

Multinational clients demand additional expertise and varied experience. BakerHostetler’s multidisciplinary professional teams assist clients in addressing cross-discipline Information Governance projects that also involve data privacy, data security, E-Discovery, and information analytics issues.

Key Contacts

Blog

In The Blogs

Previous Next
Data Privacy Monitor
Federal Magistrate Recommends Dismissing TCPA Class Claims Against Coke
September 15, 2014
Responding to an invitation to text can satisfy TCPA’s Express Consent Requirement In a Telephone Consumer Protection Act (TCPA) putative class action against Coca-Cola and its marketing agent, a Northern District of Alabama magistrate...
Read More ->
Data Privacy Monitor
All Native Advertising is Not Equal: Why that Matters Under the First Amendment and Why it Should Matter to the FTC – Part II
September 13, 2014
Editor’s Note: This blog post was originally published on September 8, 2014, courtesy of iMedia Connection’s Blog. It is repurposed with permission. In this five part series, originally published in the Summer 2014 edition of the Media Law...
Read More ->
Data Privacy Monitor
FTC Final Orders with Fandango and Credit Karma Provide Guidance on Mobile App Security
September 12, 2014
In August 2014, the Federal Trade Commission (“FTC”) approved final orders resolving its actions against Fandango, LLC (“Fandango”) and Credit Karma, Inc. (“Credit Karma”) for allegedly misrepresenting the security of their mobile apps to...
Read More ->
Data Privacy Monitor
Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach
September 12, 2014
On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold retailers more...
Read More ->
Data Privacy Monitor
All Native Advertising is Not Equal: Why that Matters Under the First Amendment and Why it Should Matter to the FTC – Part I
September 9, 2014
Editor’s Note: This blog post was originally published on September 2, 2014, courtesy of iMedia Connection’s Blog. It is repurposed with permission. In this five part series, originally published in the Summer 2014 edition of the Media Law...
Read More ->