SlideShare une entreprise Scribd logo
1  sur  19
Management Counsel’s Perspective: Eight Investigation Traps and What to do About Them Dan Michaluk 17 August 2010
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object],[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Eight Internal Investigation Traps ,[object Object]
Dan Michaluk ,[object Object],[object Object],[object Object]
Management Counsel’s Perspective: Eight Investigation Traps and What to do About Them Dan Michaluk 17 August 2010

Contenu connexe

En vedette

Students at Risk: Managing On-Campus Violence
Students at Risk:  Managing On-Campus Violence Students at Risk:  Managing On-Campus Violence
Students at Risk: Managing On-Campus Violence Dan Michaluk
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyDan Michaluk
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5Dan Michaluk
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and LitigationDan Michaluk
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee PrivacyDan Michaluk
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 

En vedette (7)

Students at Risk: Managing On-Campus Violence
Students at Risk:  Managing On-Campus Violence Students at Risk:  Managing On-Campus Violence
Students at Risk: Managing On-Campus Violence
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
 
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards   amo conference 2011 draft 5Social media risks and rewards   amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and Litigation
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee Privacy
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 

Similaire à Internal investigation traps

Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxgitagrimston
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
 
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docxScenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docxtodd331
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basicsJarle Thorsen
 
Internal Investigation 20110315 1
Internal Investigation 20110315 1Internal Investigation 20110315 1
Internal Investigation 20110315 1Mayer Brown LLP
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigationsalberto0
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Garland Technology
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for familiesLindy Kyzer
 
L2 Slides – Cyber security- social engineering year 9.
L2 Slides – Cyber security- social engineering year  9.L2 Slides – Cyber security- social engineering year  9.
L2 Slides – Cyber security- social engineering year 9.kshahid3
 

Similaire à Internal investigation traps (15)

Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Contacts1 copy.docx
Contacts1 copy.docxContacts1 copy.docx
Contacts1 copy.docx
 
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docxScenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basics
 
Umhoefer: Finding and developing investigative stories on a beat
Umhoefer: Finding and developing investigative stories on a beatUmhoefer: Finding and developing investigative stories on a beat
Umhoefer: Finding and developing investigative stories on a beat
 
Shonka Webinar V3
Shonka Webinar V3Shonka Webinar V3
Shonka Webinar V3
 
Internal Investigation 20110315 1
Internal Investigation 20110315 1Internal Investigation 20110315 1
Internal Investigation 20110315 1
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigations
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
 
L2 Slides – Cyber security- social engineering year 9.
L2 Slides – Cyber security- social engineering year  9.L2 Slides – Cyber security- social engineering year  9.
L2 Slides – Cyber security- social engineering year 9.
 

Plus de Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

Plus de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Internal investigation traps