Finally, after providing the building blocks for strong Information Governance (IG) programs and operationalizing that framework, we discuss how to sustain your IG program in the last part of the series. An effective IG program powered by the ARMA IGIM framework isn’t static. To remain relevant in an AI-driven world, it must be scalable
Kathryn Rattigan
Kathryn Rattigan is a member of the Business Litigation Group and the Data Privacy+ Cybersecurity Team. She concentrates her practice on privacy and security compliance under both state and federal regulations and advising clients on website and mobile app privacy and security compliance. Kathryn helps clients review, revise and implement necessary policies and procedures under the Health Insurance Portability and Accountability Act (HIPAA). She also provides clients with the information needed to effectively and efficiently handle potential and confirmed data breaches while providing insight into federal regulations and requirements for notification and an assessment under state breach notification laws. Prior to joining the firm, Kathryn was an associate at Nixon Peabody. She earned her J.D., cum laude, from Roger Williams University School of Law and her B.A., magna cum laude, from Stonehill College. She is admitted to practice law in Massachusetts and Rhode Island. Read her full rc.com bio here.
Etsy Sued Over Pixel Trackers: What It Means for Your Business
If you’ve ever browsed Etsy looking for a handmade candle or a quirky T-shirt, you might have unknowingly shared more than just your shopping preferences. A new lawsuit filed last week in California claims that Etsy has been quietly allowing third-party companies like Google, Meta, and Microsoft to collect personal data from users through website…
Mastering Information Governance with the ARMA IGIM 2.1 Framework – Part 3: Operationalizing the Framework
Last week, we outlined the building blocks for a strong IG program. Now that you’ve laid the groundwork, it’s time to bring your IG program to life. The ARMA IGIM framework emphasizes operational execution in three key areas:
- Procedural Framework
- Capabilities
- Information Lifecycle
These domains are where your framework tangibly interacts with AI systems…
California’s Latest Dose of Enforcement Regarding Health Data
On July 1, 2025, California Attorney General Rob Bonta announced a settlement with Healthline Media LLC stemming from alleged violations of the state’s consumer privacy law, the California Consumer Privacy Act (CCPA). According to the complaint, Healthline’s privacy practices failed to comply with several core CCPA requirements.
Opt-Out Mechanisms
Under the CCPA, California residents have…
Federal Court Sinks CIPA Wiretap Lawsuit Against Royal Caribbean Over TikTok Tracking Tool
In a significant win for Royal Caribbean Cruises, a federal judge dismissed a lawsuit that alleged the cruise line’s website violated a California privacy law by using a TikTok tracking tool. The case, Kishnani v. Royal Caribbean Cruises, challenged the cruise operator’s use of the tool under the California Invasion of Privacy Act (CIPA)…
Mastering Information Governance with the ARMA IGIM 2.1 Framework: Part 2 – Building the Foundation
Last week, we introduced you to the ARMA IGIM Framework. What’s next? Every successful Information Governance (IG) program starts with a strong base. The ARMA IGIM framework outlines three critical building blocks:
- Steering Committee
- Authorities
- Support Functions
Implementing these foundational pieces not only gets your IG program off the ground but also creates a…
Mastering Information Governance with the ARMA IGIM 2.1 Framework Part 1: Introduction to the ARMA IGIM Framework
Today, organizations face unprecedented data challenges. The sheer volume of information, evolving regulations, and the rising momentum of artificial intelligence (AI) revolutionizing industries make it clear that information governance (IG) is not optional. The ARMA IGIM 2.1 framework provides organizations with a practical, structured approach to manage data effectively, enabling them to meet these challenges…
California’s SB 690: A Game-Changer for Website Privacy Lawsuits Pushes Forward
On June 3, 2025, the California Senate unanimously passed Senate Bill 690 (SB 690) in a 35-0 vote, a strong show of support for reining in a flood of lawsuits that have taken many companies by surprise over the last few years. The bill now heads to the California Assembly, where it will face further…
Why Dumping Sensitive Data on Network Shares is a Liability
Are you storing sensitive data on a shared network drive? If so, your organization could be at serious risk of a data breach or privacy lawsuit. Shared drives, like the common “S:\ drive,” are often used to store documents, spreadsheets, customer information, financial records, and even scanned IDs. But here’s the problem: these network shares…
Trump’s Drone Duet: Executive Orders Cracking Down on Threats While Boosting U.S. Drone Leadership
This post was co-authored by Government Enforcement + White-Collar Defense partner David E. Carney.
On June 6, 2025, President Donald Trump signed two executive orders aimed at significantly reshaping the future of drone policy in the United States. One focuses on protecting national airspace from malicious drone threats, while the other seeks to supercharge…