MWLUG Conference 2009 IBM Center Chicago, IL  August 27-28, 2009 Empowering the Lotus Community
Creating Effective Compliance and E-Discovery Policies – Best Practices and Procedures Denny Russell is a Technical Suppor...
Agenda <ul><li>Introduction </li></ul><ul><li>Compliance: What is it? </li></ul><ul><li>Policies & What You Need to Know <...
Compliance:  What is it? <ul><li>Laws, regulations and policies that drive your business and the way you handle your data....
Compliance:  What is it? <ul><li>Corporate Governance  </li></ul><ul><ul><ul><ul><li>Storage Practices </li></ul></ul></ul...
Compliance:  What is it? <ul><li>Federal Regulations </li></ul><ul><ul><ul><ul><li>Sarbanes-Oxley Act (SOX) </li></ul></ul...
Compliance:  What is it? <ul><li>Legal Restrictions </li></ul><ul><ul><ul><ul><li>Federal Rules of Civil Procedure (FRCP) ...
Compliance:  What is it?
Policies <ul><li>Hiring/Termination Procedures </li></ul><ul><li>Acceptable Use Policies </li></ul><ul><li>Email Retention...
Policy Enforcement: Best Practices <ul><li>Clearly define the purpose for the policy </li></ul><ul><li>Gather support from...
What to Include in your Policies <ul><li>Without a policy in place, legal liability increases </li></ul><ul><li>The length...
Policy Enforcement Challenges <ul><li>Competing interests (corporate retention policy vs. individual and business needs) <...
Resources for Building a Policy <ul><li>http:// www.epolicyinstitute.com / </li></ul><ul><li>http:// www.soxlaw.com / </li...
E-Discovery and What you Need to Know <ul><ul><li>The process of collecting data when you become involved in legal issues....
E-Discovery: Common Risks <ul><ul><li>Common risks organizations face with electronic data: </li></ul></ul><ul><ul><li>Not...
E-Discovery: Relevant Questions <ul><li>Questions compliance officers should be asking their IT departments: </li></ul><ul...
EDRM Model <ul><li>Know which process effect you </li></ul><ul><li>How you will meet those steps </li></ul><ul><li>Agenda ...
What's Available in Domino <ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Go...
Domino Journaling <ul><li>Journaling </li></ul><ul><ul><li>Capture sent and received messages </li></ul></ul><ul><ul><li>P...
Domino Archiving <ul><li>Archiving </li></ul><ul><li>Policies allow you to control </li></ul><ul><li>Server or Local Archi...
Domino Searching Individual mail files would need to be searched manually. <ul><li>Agenda </li></ul><ul><li>Compliance: Wh...
What to Look for in a Solution <ul><li>Flexibility   </li></ul><ul><ul><ul><ul><li>Configuration </li></ul></ul></ul></ul>...
Q & A <ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></...
Contact Information <ul><li>Denny  Russell </li></ul><ul><ul><ul><ul><li>[email_address] </li></ul></ul></ul></ul><ul><ul>...
Upcoming SlideShare
Loading in...5
×

Mwlug Compliance And E Discovery Policies

298

Published on

Tips and Best Practices for building and enforcing email retention policies.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
298
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mwlug Compliance And E Discovery Policies

  1. 1. MWLUG Conference 2009 IBM Center Chicago, IL August 27-28, 2009 Empowering the Lotus Community
  2. 2. Creating Effective Compliance and E-Discovery Policies – Best Practices and Procedures Denny Russell is a Technical Support Specialist for the Domino products at Sherpa Software. He is a contributor to Sherpa’s Domino Blog, Administrator for the Lotus Notes/Domino environment (including Domino 8x, Sametime, Quicker and Blackberry Enterprise Server for Notes) and webmaster for Sherpa's corporate website. Session: In this session, we will discuss the challenges of developing, implementing and enforcing a corporate retention policy that balances storage demands and those of your Legal and Compliance Teams. Learn about the Do’s and Don’ts of policy design as well as discover potential stumbling blocks and how to address exceptions. Examine how regulatory requirements and e-discovery requests could impact your policy and what to expect on the event of litigation. Lastly, determine if you have the right tools in place to support your policy initiatives and find out what additional tools can help.
  3. 3. Agenda <ul><li>Introduction </li></ul><ul><li>Compliance: What is it? </li></ul><ul><li>Policies & What You Need to Know </li></ul><ul><li>E-Discovery & What You Need to Know </li></ul><ul><li>What's Available in Domino </li></ul><ul><li>What to look for in a Solution </li></ul><ul><li>Questions </li></ul>
  4. 4. Compliance: What is it? <ul><li>Laws, regulations and policies that drive your business and the way you handle your data. </li></ul><ul><ul><ul><ul><li>Space Needs vs. Legal/Industry Regulations </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul>
  5. 5. Compliance: What is it? <ul><li>Corporate Governance </li></ul><ul><ul><ul><ul><li>Storage Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Internal Procedures </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul>
  6. 6. Compliance: What is it? <ul><li>Federal Regulations </li></ul><ul><ul><ul><ul><li>Sarbanes-Oxley Act (SOX) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Health Insurance Portability and Accountability Act (HIPAA) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Gramm-Leach-Bliley Act (GLBA) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>FDA </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul>
  7. 7. Compliance: What is it? <ul><li>Legal Restrictions </li></ul><ul><ul><ul><ul><li>Federal Rules of Civil Procedure (FRCP) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Litigation Holds </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul>
  8. 8. Compliance: What is it?
  9. 9. Policies <ul><li>Hiring/Termination Procedures </li></ul><ul><li>Acceptable Use Policies </li></ul><ul><li>Email Retention Periods </li></ul><ul><li>Instant Messaging Policies </li></ul><ul><li>Preservation Policies </li></ul><ul><li>Electronic Discovery Procedures </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul>
  10. 10. Policy Enforcement: Best Practices <ul><li>Clearly define the purpose for the policy </li></ul><ul><li>Gather support from Legal, Management and IT </li></ul><ul><li>Establish practical rules for effective conduct of business </li></ul><ul><li>Find a solution that fits your infrastructure and budget </li></ul><ul><li>Handle exceptions, e.g. Litigation Holds </li></ul><ul><li>Enforceable, Auditable </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul>
  11. 11. What to Include in your Policies <ul><li>Without a policy in place, legal liability increases </li></ul><ul><li>The length of time documents are kept before they can be destroyed </li></ul><ul><li>Email, Files, IM, Hard Copies, etc. </li></ul><ul><li>Where will data be stored? </li></ul><ul><li>What format will the data be in? </li></ul><ul><li>Who will have access and what can they do with the data? </li></ul><ul><li>Will there be exceptions to data or employees that are part of it? </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul><ul><ul><ul><li>What to Include </li></ul></ul></ul>
  12. 12. Policy Enforcement Challenges <ul><li>Competing interests (corporate retention policy vs. individual and business needs) </li></ul><ul><li>Requirements vs. Resources </li></ul><ul><li>Buy-in & adherence from relevant personnel </li></ul><ul><li>‘ Smoking Gun’ Emails </li></ul><ul><li>Discovery Requirements </li></ul><ul><li>‘ Reduce risk while meeting a business need’ </li></ul><ul><li>Lack of well defined rules </li></ul><ul><li>No ‘one size fits all’ policy </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul><ul><ul><ul><li>What to Include </li></ul></ul></ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul>
  13. 13. Resources for Building a Policy <ul><li>http:// www.epolicyinstitute.com / </li></ul><ul><li>http:// www.soxlaw.com / </li></ul><ul><li>http:// www.hhs.gov/ocr/privacy/index.html </li></ul><ul><li>http://www.law.cornell.edu/rules/frcp/ </li></ul><ul><li>http://www.sherpasoftware.com/blogs/SherpaBlog.nsf/ </li></ul><ul><li>http://www.aiim.com </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><li>Corporate Governance </li></ul></ul><ul><ul><li>Federal Regulations </li></ul></ul><ul><ul><li>Legal Restrictions </li></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul><ul><ul><ul><li>What to Include </li></ul></ul></ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul><ul><ul><ul><li>Resources </li></ul></ul></ul>
  14. 14. E-Discovery and What you Need to Know <ul><ul><li>The process of collecting data when you become involved in legal issues. </li></ul></ul><ul><ul><li>Placing documents/Users on Legal Hold </li></ul></ul><ul><ul><li>How will you get the data? </li></ul></ul><ul><ul><li>Where will you find the data? </li></ul></ul><ul><ul><li>Who will be included? </li></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul>
  15. 15. E-Discovery: Common Risks <ul><ul><li>Common risks organizations face with electronic data: </li></ul></ul><ul><ul><li>Not retaining information that should be retained </li></ul></ul><ul><ul><li>Retaining data that has outlived its usefulness </li></ul></ul><ul><ul><li>Not having a defensible process for data management </li></ul></ul><ul><ul><li>Inability to discover and retrieve relevant information, when requested </li></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul>
  16. 16. E-Discovery: Relevant Questions <ul><li>Questions compliance officers should be asking their IT departments: </li></ul><ul><ul><li>Where is corporate data (corporate documents, emails, contracts, etc) being stored - network shares, databases, local desktops, in PST files, etc.? </li></ul></ul><ul><ul><li>Does the IT department have the ability to reach all of this data and search it? </li></ul></ul><ul><ul><li>Can we retrieve unadulterated copies of this data? </li></ul></ul><ul><ul><li>Is there a process to maintain chain of custody? </li></ul></ul><ul><ul><li>Can we enforce a legal hold and prevent the purging of relevant data, if necessary? </li></ul></ul><ul><ul><li>If we have policies, how are they being implemented? Is the enforcement process validated? </li></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul>
  17. 17. EDRM Model <ul><li>Know which process effect you </li></ul><ul><li>How you will meet those steps </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul>
  18. 18. What's Available in Domino <ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><li>Domino provides many tools to help you with this process. </li></ul><ul><li>Journaling </li></ul><ul><li>Archiving </li></ul><ul><li>Searching </li></ul>
  19. 19. Domino Journaling <ul><li>Journaling </li></ul><ul><ul><li>Capture sent and received messages </li></ul></ul><ul><ul><li>Process based on: </li></ul></ul><ul><ul><ul><li>Content within the subject or body fields </li></ul></ul></ul><ul><ul><ul><li>Recipients or senders </li></ul></ul></ul><ul><ul><ul><li>Roll-over based on age or size </li></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul>
  20. 20. Domino Archiving <ul><li>Archiving </li></ul><ul><li>Policies allow you to control </li></ul><ul><li>Server or Local Archiving </li></ul><ul><ul><ul><ul><li>Local Archives are a legal/E-Discovery nightmare </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Archiving </li></ul></ul></ul></ul>
  21. 21. Domino Searching Individual mail files would need to be searched manually. <ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Archiving </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Searching </li></ul></ul></ul></ul>
  22. 22. What to Look for in a Solution <ul><li>Flexibility </li></ul><ul><ul><ul><ul><li>Configuration </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Exclusions/Legal Hold </li></ul></ul></ul></ul><ul><li>Friendly to End-Users </li></ul><ul><ul><ul><ul><li>Ease of use for the users </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Searchable – Can they easily find their data </li></ul></ul></ul></ul><ul><li>Friendly to E-Discovery Needs </li></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Archiving </li></ul></ul></ul></ul><ul><li>What to Look for </li></ul>
  23. 23. Q & A <ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Archiving </li></ul></ul></ul></ul><ul><li>What to Look for </li></ul><ul><li>Questions </li></ul><ul><li>Contact Info </li></ul><ul><li>Questions </li></ul>
  24. 24. Contact Information <ul><li>Denny Russell </li></ul><ul><ul><ul><ul><li>[email_address] </li></ul></ul></ul></ul><ul><ul><ul><ul><li>http://www.sherpasoftware.com/ blogs/SherpaBlog.nsf / </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Twitter: http:// www.twitter .com/DennyRussell </li></ul></ul></ul></ul><ul><ul><ul><ul><li>LinkedIn: http:// www.linkedin.com/in/dennyrussell </li></ul></ul></ul></ul><ul><li>Agenda </li></ul><ul><li>Compliance: What is it? </li></ul><ul><ul><ul><li>Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Federal Regulations </li></ul></ul></ul><ul><ul><ul><li>Legal Restrictions </li></ul></ul></ul><ul><li>Policies </li></ul><ul><ul><ul><ul><li>Types of policies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Best Practices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What to Include </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Enforcement Challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Resources </li></ul></ul></ul></ul><ul><li>E-Discovery </li></ul><ul><ul><ul><ul><li>Common Risks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Relevant Questions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>EDRM Model </li></ul></ul></ul></ul><ul><li>Available in Domino </li></ul><ul><ul><ul><ul><li>Journaling </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Archiving </li></ul></ul></ul></ul><ul><li>What to Look for </li></ul><ul><li>Questions </li></ul><ul><li>Contact Info </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×