The Sedona Conference® has released the Final Version of its Commentary on Information Governance, Second Edition (April 2019). The Second Edition of this Commentary again sets out 11 principles of information governance that provide a strategic framework for senior management to make decisions with respect to all information within an enterprise. However, the latest Commentary has been revised to incorporate changes and advances in technology and law, including on privacy, that have occurred over the past four years, and in particular in an expanded set of footnotes it includes updated references to publications of The Sedona Conference that have been issued in the intervening years since 2014.
The Sedona Conference® has released a Public Comment Version of its Commentary on Information Governance, Second Edition. The latest edition of this Commentary sets out 11 principles of information governance that provide a strategic framework for senior management to make decisions with respect to all information within an enterprise and accounts for changes and advances in technology and law that have occurred over the past four years. It also incorporates guidance on information governance contained in The Sedona Principles, Third Edition, which we discussed in a previous blog post. As defined in this Commentary, information governance “means an organization’s coordinated, interdisciplinary approach to satisfying information compliance requirements and managing information risks while optimizing information value.” The Commentary recognizes that information governance encompasses a variety of disciplines, including traditional records and information management, data privacy, information security, and e-discovery.
The Sedona Conference®, a nonprofit research and educational think tank dedicated to the advanced study of law, particularly in information governance, has released its Incident Response Guide , open for public comment through June 19, 2018. Drafted by Working Group on Data Security and Privacy Liability (WG11), the guide is meant to serve as a practical resource for practitioners dealing with the legal, technical, and policy issues related to data-related incidents – from distributed denial-of-service to ransomware attacks.