sponsored by SearchCompliance.com
Posted:  28 Jan 2014
Premiered:  31 Jan 2014
Format:  Multimedia
Type:  Virtual Environment
Language:  English

As organizations' data volume continues to grow at an exponential rate, information governance is vital for proper litigation response, to maintain compliance and to stay secure. The huge amount of data organizations are responsible for, however, sometimes makes effective information governance a daunting proposition. As a result, predictive coding use is gaining traction as organizations seek tools to aid in data organization/classification, assist data security and even provide business efficiencies. Enter this interactive, online learning environment to learn more about predictive coding and how the technology provides numerous business-related information governance benefits. Topics covered will include:

  • Data governance benefits of predictive coding
  • Using predictive coding for data classification
  • The business value of predictive coding tools
  • And much more


Leigh Isaacs
director of records and information governance at Orrick, Herrington & Sutcliffe, LLP

Leigh Isaacs, CIP, is director of records and information governance at Orrick, Herrington & Sutcliffe LLP, in Washington, DC. Isaacs assists with records management engagements, and her experience includes deployment of enterprise programs, development of information management policies, creation of retention schedules and on- and off-site storage considerations.

Compliance Best Practices | Content Analytics | Content Management | Information Governance | Information Management | Records Management

View All Resources sponsored by SearchCompliance.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement