close
Hillary Clinton’s Emails and the Looming Issue of Shadow IT

Hillary Clinton’s Emails and the Looming Issue of Shadow IT

28th December 2016283Views
img.jpg
Spread the love

“It is very difficult to conceive of a scenario—short of nuclear winter—where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business.” —Jason R. Baron to the New York Times

On March 2nd, 2015, The New York Times published a breaking story about Hillary Clinton, who used a private email account to conduct government business. Due to The Freedom of Information Act, many people questioned whether Clinton acted inconsistently with her federally mandated record keeping obligations. Furthermore, is this a wakeup call for companies and governmental entities who are not controlling shadow IT, the practice of employees using private devices and softwares at work?

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Jason R. Baron, of counsel to Drinker Biddle & Reath, LLP and co-chair of The Information Governance Initiative, about the Hillary Clinton controversy and the future of Shadow IT, BYOD, and information governance.

Topics Include:

  • Federal records collection and keeping policies
  • Unmarked classified information on Clinton’s private server
  • Federal, state, and other public figures using personal email for public purposes
  • Shadow IT and BYOD policies for companies and governmental entities
  • The bigger picture of big data and information governance
  • Whether Clinton’s actions were legal

Jason R. Baron is of counsel to Drinker Biddle & Reath, LLP, practicing in their Information Governance and eDiscovery Group, and is co-chair of The Information Governance Initiative, a think tank and vendor neutral consortium. Previously, he served as director of litigation at the National Archives and Records Administration, and as a trial attorney and senior counsel at the U.S. Department of Justice.

img.jpg

Choosing and Setting Up a Domain Name

img.jpg

Open Source Security Issues: Next on the Radar for General Counsels

Leave a Response