7 Reasonable Steps for Legal Holds of ESI and Other Documents
This book is a practical, how-to guide describing step-by-step a best practice process for identifying trigger events and implementing a litigation hold. It provides a...
To access the catalog view and search items below.
After checkout, access your purchases in the My Activity section on the homepage.
Please note: We are currently working on finalizing transcript records and current enrollments.
We
are grateful for your patience during this time. If you have any
questions, please feel free to contact us at education@armaintl.org or
click on the question icon below for additional support
7 Reasonable Steps for Legal Holds of ESI and Other Documents
This book is a practical, how-to guide describing step-by-step a best practice process for identifying trigger events and implementing a litigation hold. It provides a...
7 "Reasonable Steps" To Defend Litigation Holds Under the New "Safe Harbor"
1.0 IGP-LEGAL | This learning lab analyzes the 2015 amendment to Rule 37(e) of the Federal Rules of Civil Procedure and the "Safe Harbor" in the rule which prevents a...
Access Rights to Business Data on Personally-Owned Computers
This paper provides guidance to both employees and employers, helping them navigate the issues of sharing data across multiple computers responsibly and legally, and...
AICPA: Leveraging Privacy Principles and Frameworks for Global Privacy Risk Management
1.0 IGP-LEGAL | Join this session to learn how organizations leverage the AICPA Generally Accepted Privacy Principle and SOC 2 attestation reporting to address these...
Aligning RIM and Privacy for Sound Information Management
1.0 IGP-LEGAL | This session will explore the alignment and intersection of RIM and privacy and recommend methods for forging a collaborative role.
Auditing for Records and Information Management Program Compliance
This technical report expands RIM professionals’ knowledge and provides implementation-based advice related to the RIM audit.
Case Study: Interior Department's Strategy for E-Mail Management with Auto-Classification
1.0 IGP-TECH | Join this session to hear the strategy used to build the program, lessons learned, and next steps. Whether you need support for public access, privacy,...
Confidentiality, Privacy, and Information Security
This book provides an introduction to topics that U.S. law firm records and IG professionals must be familiar with in order to establish IG programs that effectively...
Data Governance: The EU General Data Protection Regulation
1.0 IGP-PRIVACY | You will learn how to develop a data mapping framework, which is fundamental to your organizational data governance program and essential to GDPR...
Data Privacy & Security: Emerging "Reasonableness" Standards (SEDONA)
1.0 IGP-RISK MGT | Join this buzz session to hear common pitfalls associated with technologies, attacker methodologies and objectives, and achievable defenses that can...
Data Privacy Via Data Security
1.0 IGP-PRIVACY | What’s the best way to go about ensuring data privacy? It begins with ensuring data security. Learn how you can achieve your data privacy and...
Data Retention: The Blind Spot in Your Privacy Program
1.0 IGP-RISK MGT | How can organizations integrate enforcement of policies like data retention, data minimization, access requests, etc. across the organization’s IT...
Data Security in a Hybrid World
1.0 Info Security | Dive into innovative strategies to overcome the data security hurdles posed by modern hybrid and multi-cloud environments. This session is tailored...
Defensible Deletion: The Dangers, Dollars, and Disposition of Digital Debris
1.0 IGP-LEGAL | In this session, you'll learn of ways to identify your digital debris and quantify how data hoarding can damage your organization.
Developing an Actionable Global Retention & Deletion Programbinar
1.0 GEN-CEU | Join this exclusive webinar, where you will gain valuable insights, practical strategies, and best practices to navigate the complexities of data...