Whither Cyberspace: Security, Privacy Rights, the Law and the Private Sector
ABA Standing Committee on Law & National Security, 4 February 2012; panel presentation with Vince Polley, Stewart Baker, Harriet Pearson, and Judith Miller - 90 minute podcast here
Social Media Strategies for Bar Associations
(ABA “Business Bar Leaders Conference”, 11 May 2012; Vince Polley, Carissa Long, Catherine Sanders Reach, and Dan Schwartz)—integrated audio/video .m4a slideshow is here (82 minutes; 49 megabytes).
(ABA “Business Bar Leaders Conference”, 11 May 2011; Vince Polley, Elizabeth Derrico, and Catherine Sanders Reach)—integrated audio/video .m4a slideshow is here (80 minutes; 46 megabytes). PDF of the presentation is here; email Vince for a copy of the annotated PowerPoint.
“Social Media Legal Issues”
(North Carolina Bar Association; 18 February 2011; Vince Polley)—integrated audio/video .m4a slideshow is here (40 minutes; 46 megabytes). PDF of the presentation is here; email Vince for a copy of the annotated PowerPoint.
“Social Network Legal Issues - Threat and Opportunity”
Presentation to Petroleum Equipment Suppliers Association on 12 January 2010, on the risks of premature, overly restrictive restriction on use of new social media tools like twitter, Facebook, etc. 10-slide PowerPoint (with speakers notes) here.
“Head in the Cloud - Feet in the Code of Professional Responsibility”
Managing the Ethical Risks to Lawyers from Web 2.0 Technologies, Portable Devices and Wireless Access (ABA annual meeting; 2 August 2009; Roland Trope, Chris Kelly, John Barkett, Claudia Ray, Vince Polley)—PDF of program materials here; 2-hour audio podcast of the program here.
“Blogs, Social Networking and Web 2.0—Employees Use These Tools, Should Companies Have Rules?”
(ABA Business Law Section spring meeting; 11 April 2008; Bill Denny, AJ Johnson, Gary Spangler, Scott Wilder, Vince Polley)—integrated audio/video M4A slideshow is here (2 hours). Key discussion about policy proliferation and coordination at time-stamp: 1h28m40s (other Polley discussion about the NLRB’s Guard Publishing case at time-stamp: 1h04m).
“Data Security Breaches—Legal Issues”
“Electronic Communications Policies: Risk Management—Avoiding an Accident Waiting to Happen”
(New York County Bar Association presentation; 15 May 2006; Vince Polley)—annotated PowerPoint presentation here; 360MB video here. (Consider downloading the file and then playing it; in-browser display doesn’t begin for several minutes due to file size.)
“Data Security Breaches—Legal Landscape”
(National Association of College and University Attorneys; 8 November 2007)—annotated PowerPoint presentation (with speakers notes) is here; complete MP3-audio from the 90 minute presentation (Vince Polley, Amy Blum, Kent Wada) is here.
Enterprise Social Software (Christian Gray, Craig Honick; IT Conversations; 14 April 2008)
Very interesting discussion of current uses (and likely expansion) of various “social networking” tools in companies, and the knowledge-management/productivity implications. Discusses how tools (e.g., wikis, instant messaging, twitter, SecondLife, podcasts, blogging) can affect productivity and effect collaboration. Discusses inward-facing uses of these tools (e.g., within the enterprise’s firewall) and outward-facing uses (e.g., facilitating the emergence of customers’ communities). Discusses how some implementations may occur informally (e.g., using no-cost software within a department), and how such efforts may run afoul of company policies (e.g., on IP protection). 48 minutes; podcast here
Data Governance (Technometria; podcast with IBM’s Steven Adler)
Since data is the raw material of the information economy, it is increasingly important that it is properly controlled by organizations. Data governance is a quality control discipline for assessing, managing, using, improving, monitoring, maintaining, and protecting organizational information. Steven Adler, Program Director of IBM Data Governance, discusses this increasingly important issue. He first talks about the overall importance of data governance and how organizations must build data accountability. He discusses IBM’s work to protect data as a business priority. He reviews the Data Governance Maturity Model, giving useful details about how organizations can better protect their valuable commodity. [This is an extremely useful discussion about “Data Governance” systematic methodologies to assess and manage the data-management process. Discusses the evolution of a formal “Data Governance Maturity Model”, benchmarking and self-assessment processes, and integrating data-governance with measurable business objectives.] 56 minutes; podcast here.