Now more than ever before there is an increased demand for employees to share and collaborate on documents with people inside and outside of their respective organizations. For this reason, organizations of all shapes and...more
Software as a Service (SaaS) adoption has continued to climb with each passing year. Major contributors to this have been ease of deployment, improved productivity and lower cost of ownership. Furthermore, organizations have...more
After the terrorist attack in Orlando, Florida, early this month, the Electronic Communications Privacy Act (ECPA) has been discussed quite a bit. The ECPA, a law which took effect in 1986, limits the government’s access to...more
6/21/2016
/ Data Privacy ,
Digital Communications ,
ECPA ,
Electronic Communications ,
Electronically Stored Information ,
FBI ,
Hate Crimes ,
Invasion of Privacy ,
Mass Shootings ,
National Security Letters (NSLs) ,
Popular ,
Terrorist Acts
A recent Advice from Counsel study sponsored by FTI Technology, entitled “The State of Information Governance in Corporations” found data security to be the top driver for information governance initiatives. The purpose of...more
In an information governance model, there are business-focused components and aspects, and there are technology-focused components and aspects. Information Governance isn’t just technology driven, nor is it solely business...more
The GDPR (General Data Protection Regulation) outlines a series of amendments to the data protection and data privacy requirements applicable to all companies with European customers, regardless of where the company’s...more
There is no secret sauce to achieving information governance nirvana. The reality is someone must take ownership of an organization’s information governance program. The industry as a whole has been discussing organizations...more
An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more
With all the data breach activity over the past several years, any organization or individual that hasn’t been affected in some way almost feels left out. According to the Department of Health and Human Services, 120 million...more