Card image cap

Incorporating the Power of Technology into GDPR Compliance Programs

Level: Advanced
Runtime: 61 minutes
Recorded Date: January 30, 2018
Click here to share this program
Printer-Friendly Version


2:00 pm - 3:00 pm
  • 4 months and counting!
  • Penalties and legal requirements
  • How technology can help
  • Questions and answers
Runtime: 1 hour
Recorded: January 30, 2018


In this program, a group of experienced legal technologists will explore how powerful technology and advanced analytics can enhance the effectiveness of GDPR compliance efforts.

This program was recorded on January 30th, 2018.

Provided By

Card image cap


Card image cap

Anna Simpson

Technical Practice Lead and a Chief Architect for the Information Governance

Anna Simpson is the Technical Practice Lead and a Chief Architect for the Information Governance product portfolio at Veritas. Based in the US, she has played a leading role in the design and implementation of Information Governance strategies for enterprises globally. Since 2002, Anna has lived and worked in three different continents and contributed to successful software startups in spaces ranging from legal to information management. In 2010 she joined Clearwell, a pioneer in the eDiscovery space. As eDiscovery evolved and matured, Clearwell became the market leader and was acquired by Symantec (now Veritas) in 2011. In her current role, Anna drove the Dark Data Assessment initiative which continues to help organizations globally gain visibility into their unstructured data and associated risk. These experiences give her an interesting perspective on the global regulatory landscape and increasing information governance challenges faced by organizations across all verticals.

Card image cap

Kenneth N. Rashbaum

Barton LLP

Kenneth N. Rashbaum advises multinational corporations, financial services organizations and life sciences organizations in the areas of privacy, cybersecurity, e-discovery for litigation and regulatory proceedings and information management. He counsels these entities on information governance and its compliance with federal, state, and non-U.S. laws and the interface of e-commerce and legal and regulatory liabilities in areas such as cybersecurity and breach response. Ken has vast experience in preparation of provisions in contracts, service level agreements and license agreements relating to compliance with data protection and privacy laws in the U.S. and other countries. He also leads information security and data breach response assessments, investigations and remediation initiatives; prepares policies for social media legal and regulatory compliance; and represents technology and life sciences organizations in federal and state investigations and audits, and in litigation.

Ken is a Distinguished Neutral on the Cyber Panel of the International Institute for Conflict Prevention and Resolution (“CPR”). In this capacity, he serves as a mediator in breach of contract disputes that arise from data breaches, claims of trade secret theft and disputes over cyber risk insurance coverage. Ken also serves as special e-discovery counsel for complex litigation and in matters in which electronic evidence from beyond the U.S. is required. He has been recognized internationally as a thought leader in electronic discovery and disclosure, and has served as national e-discovery counsel for multinational pharmaceutical corporations and global e-discovery counsel in products liability and IP litigation. Ken was appointed to the faculty of the Federal Judicial Center for its September, 2010 session and the Georgetown Advanced E-Discovery Institute (November 2009 and December 2012 sessions) to lead sessions on international e-discovery issues and challenges.

In his capacity as a nationally known expert on data privacy, Ken counsels healthcare organizations on compliance with federal, state and judicial standards governing protected health information. He has served as HIPAA and privacy counsel to major hospital systems, health plans, physicians’ groups, cloud computing providers and health information application developers; advised academic hospital systems on protocols for implementation of electronic health records; and provided counsel on risk management issues in access, uses and disclosures of electronic patient information.

Ken is an Adjunct Professor of Law at Fordham University School of Law and had been a member of the Adjunct Faculty at the Maurice A. Deane School of Law at Hofstra University from 2013 – 2015.

Prior to joining Barton, Ken was a senior litigation partner in the New York office of Sedgwick LLP (formerly Sedgwick, Detert, Moran & Arnold) where he was the Co-Chair of the E-Discovery, Compliance and Data Management Practice Group.

Card image cap

Phil Richards

Chief Technology Officer

Phil is the CTO (Chief Technology Officer) at DiscoverReady. He is responsible for engineering and development, Technology Services, Solutions Architecture and R&D.

Card image cap

Matthew Nelson

Attorney, Corporate Strategy

Matt Nelson evaluates complex legal and regulatory issues and trends important to Symantec's global business strategy and internal operations. He also monitors and influences key global data privacy and security initiatives as Membership Chair of ACC's Information Governance Committee. He frequently serves as a panelist with federal judges, regulators and other thought leaders in an effort to help bridge the gap between law and technology. Previously he served as a Legal Consultant for EMC and Kroll and as a Litigation Attorney for Ropers Majeski. Matt holds a law degree from the University of Idaho College of Law.

Card image cap

Theresa Beaumont

Groupe Beaumont

Ms. Beaumont’s 25-year legal, technology and business background is truly unique in the industry. Ms. Beaumont is pragmatic and ROI oriented. She holds the big picture and also understands the devil is not only in the details, but in the speed with which problems are resolved. Success ultimately hinges on strategy and execution under necessary return on investment demands. Ms. Beaumont advises enterprise clients and others on multi-stakeholder data management challenges and legal/regulatory requirements, using cutting-edge technology within a legally defensible framework.

Ms. Beaumont graduated from Northwestern University School of Law (JD ’92). As an experienced litigator and early adopter of technology to solve global discovery challenges (pre-email), Ms. Beaumont founded a litigation management firm, advising clients on a multitude of E-Discovery and other data challenges. Ms. Beaumont then joined Google as in-house counsel to form the company’s Global E-Discovery Department. Ms. Beaumont also served as subject matter expert on development of Cloud and IG/ Records Management products. In addition, Ms. Beaumont’s entrepreneurial and screenwriting (UCLA) background benefits her clients through creative communication balanced with a deep appreciation for real-world business environments.

Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference


Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.



Add to Cart
Card image cap
97 minutes
26 Words that Created the Internet - Basics of the Communications Decency Act Section 230 Safe Harbor
This program will examine the basics of CDA 230 and its day to day affect for those who advise internet businesses as well as those who litigate against them. It will give practical guidance as to what extend internet companies can or should edit or censor the information their users contribute to their sites and to what extent those users will actually be liable.

New Media Rights


Add to Cart
Card image cap
63 minutes
360-Degree View on How to Navigate a Crisis
During this session, our panel of experts will explore the following topics to arm you with a plan to protect the company and minimize long-term problems: - Building a crisis management team and understanding each person’s unique role -Preparedness – advance planning and assessing potential risk areas - First Response – responding in the critical first hours and days to minimize the long-term impact - Resolution Strategy – managing various actions stemming from the crisis to enable the best resolution for the company.

Women, Influence & Power in Law Conference


Add to Cart
Previous Next