Practicing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleWhen Was The Last Time You Assessed Your Cloud Provider’s Platform and...
Understanding third party risk is a regulatory requirement. Before contracting with a cloud provider, confirm that you can conduct your own assessment. The post When Was The Last Time You Assessed Your...
View ArticleData Privacy: The Year in Review and Ahead
2015 proved to be another banner year for data privacy issues and 2016 is looking to be no different. The post Data Privacy: The Year in Review and Ahead appeared first on Intralinks CollaboristaBlog.
View ArticleData Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?
To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...
View ArticleData Sovereignty in A Regulated World
Under the more frequent use of the term, data sovereignty is the concept that data is under the jurisdiction of the country where it physically resides. The post Data Sovereignty in A Regulated World...
View ArticleProtecting Data, Technically.
As I mentioned in a post the middle part of last year, the physical location of data remains an important aspect in securing it from unwanted government prying. The post Protecting Data, Technically....
View ArticleCollaboration Under New General Data Protection Regulations in the European...
The General Data Protection Regulation will impact businesses that operate or collaborate in Europe. How will businesses have to update policy? The post Collaboration Under New General Data Protection...
View ArticleConfused About Data Sovereignty? You Certainly Aren’t Alone
Research by Ovum (sponsored by Intralinks) indicates there is confusion about data sovereignty, particularly around the simple concept of "where data is”. The post Confused About Data Sovereignty? You...
View ArticleIs Privacy Dead? Not According to Speakers at RSA 2016
While many of us have given up on the idea that we still have any real privacy, a quick look at the RSA 2016 Conference agenda might give you some hope. The post Is Privacy Dead? Not According to...
View ArticleIntralinks’ Approach to Data Sovereignty Compliance
Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...
View ArticlePrivacy Rules Include Your Cloud Provider — Make Sure They’re Compliant
Risk and compliance challenges no longer stop at organizational boundaries. Some government rules mandate that risk management policies cover cloud vendors. The post Privacy Rules Include Your Cloud...
View ArticleData Sovereignty: A Tale of Two Stories
Intralinks co-sponsored a roundtable — hosted by Economist Events — aiming to understand how the industry is reacting to growing data sovereignty concerns. The post Data Sovereignty: A Tale of Two...
View ArticleCyber Checklist: Security Questions to Ask Your Law Firm
What questions should you ask your law firm regarding its security posture? Let's start with industry standard, ISO 27001 certification security principles. The post Cyber Checklist: Security Questions...
View ArticleHow Three Rivers Legal Services Uses Intralinks to Help Save Lives
Three Rivers Legal Services uses Intralinks to securely store and share critical files containing personally identifiable information of its clients. The post How Three Rivers Legal Services Uses...
View ArticlePrivacy Shield 101: U.S. Companies Face New Rules
If you’re a U.S. company doing business in Europe, what does the Privacy Shield mean for you? Here are the key points. The post Privacy Shield 101: U.S. Companies Face New Rules appeared first on...
View ArticleThe Trojan Horse Effect: How We Found Highly Sensitive Business Documents in...
For the third year in a row, we uncovered sensitive files stored on consumer file sharing services in our routine Google AdWords campaign. The post The Trojan Horse Effect: How We Found Highly...
View ArticlePrivacy Shield 101: What Does the Future Look Like?
The Privacy Shield has many moving parts. While the situation is still somewhat volatile, here's what the future of data privacy regulations might look like. The post Privacy Shield 101: What Does the...
View ArticleBanks Don’t Break Laws, Individuals Do!
Regulators are increasing their focus on individual accountability. No bank employees are free from scrutiny, including risk and compliance professionals. The post Banks Don’t Break Laws, Individuals...
View ArticleWhat Happens to Data Transfers if the UK Leaves the EU?
With the EU referendum campaigns in full swing, we need to discuss the implications of a leave vote on data transfers, and what it would mean for companies. The post What Happens to Data Transfers if...
View ArticleCollaboration Under New General Data Protection Regulations in the European...
The General Data Protection Regulation will impact businesses that operate or collaborate in Europe. How will businesses have to update policy? The post Collaboration Under New General Data Protection...
View Article