Latest Publications

Share:

Mastering Information Governance with the ARMA IGIM 2.1 Framework – Part 4: Sustaining and Evolving IG Practices

Finally, after providing the building blocks for strong Information Governance (IG) programs and operationalizing that framework, we discuss how to sustain your IG program in the last part of the series. An effective IG...more

Mastering Information Governance with the ARMA IGIM 2.1 Framework: Part 2 – Building the Foundation

Last week, we introduced you to the ARMA IGIM Framework. What’s next? Every successful Information Governance (IG) program starts with a strong base....more

Why Dumping Sensitive Data on Network Shares is a Liability

Are you storing sensitive data on a shared network drive? If so, your organization could be at serious risk of a data breach or privacy lawsuit. Shared drives, like the common “S:\ drive,” are often used to store documents,...more

Navigating the AI Frontier: Why Information Governance Matters More Than Ever

Artificial Intelligence (AI) is rapidly transforming the legal landscape, offering unprecedented opportunities for efficiency and innovation. However, this powerful technology also introduces new challenges to established...more

The CIO-CMO Collaboration: Powering Ethical AI and Customer Engagement

The rapid advancement of artificial intelligence (AI) technologies is reshaping the corporate landscape, offering unparalleled opportunities to enhance customer experiences and streamline operations. At the intersection of...more

Navigating the Future: Generative AI and Information Governance in 2025

Generative Artificial Intelligence (Gen AI) is transforming industries at an unprecedented pace, unlocking new possibilities in automation, creativity, and problem-solving. However, as we look toward 2025, the success and...more

Data Privacy + Cybersecurity Insider - January 2024 #2

CYBERSECURITY - SEC’s Hacked X Account Leads to Tumultuous Bitcoin Market - The Securities and Exchange Commission has confirmed that its X account “was compromised, and an unauthorized post was posted.” The SEC...more

The Risks of Excessive Data Retention and Tips for Information Security

In today’s digital age, our every action generates a trail of data. From online searches to credit card details, this data is collected by companies to enhance their services. However, the question arises – how long should...more

Data Privacy + Cybersecurity Insider - January 2024

CYBERSECURITY - TechRadar's Cyber Predictions for 2024 are Spot On - Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more

Exploring the Future of Information Governance: Key Predictions for 2024

Information governance has evolved rapidly, with technology driving the pace of change. Looking ahead to 2024, we anticipate technology playing an even larger role in data management and protection. In this blog post, we’ll...more

10 Essential Strategies for Successful Information Governance and Data Retention for Executives

Information governance and data retention have been important topics in the corporate world for years. As an executive, it’s crucial to ensure effective management, storage, and secure disposal of your company’s data. Having...more

Data Privacy + Cybersecurity Insider - July 2020 #3

CYBERSECURITY - Chinese and Russian Hackers Targeting COVID-19 Vaccine Makers in U.S. Crosshairs - Last week, authorities from the United States, the United Kingdom and Canada accused a well-known hacker group tied to...more

Three Keys to Avoid Microsoft Teams Data Swamp

The COVID-19 pandemic has certainly forced companies to innovate and explore new ways of working across its workforce and client base. Some have decided to dive head first into implementing collaboration technologies such as...more

GDPR Awareness On The Rise as Complaints Increase

The U.K. data privacy watchdog reports that the number of complaints received since the EU’s General Data Protection Regulation (GDPR) took effect three months ago has almost doubled. ...more

A CIO Budget Playbook for 2018

It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more

Data Privacy + Cybersecurity Insider - November 2017 #2

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3. The corps has been in existence for three years but not statutorily deployed. ...more

A CIO Budget Playbook for 2018

It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more

Why Was Facebook Fined by AEPD?

Today, the Spanish data protection agency (AEPD) fined Facebook 1.2 million euros ($1.4 million USD) in connection with how the company collects personal data for advertising purposes. The AEPD said Facebook did not get...more

5 Focus Areas in Preparation for GDPR Compliance

In less than 300 days, the European General Data Protection Regulation (GDPR) will go into effect and forever change the privacy landscape. Leading industry organization, Gartner, Inc., predicts that more than 50 percent of...more

Data Protection Laws Could Increase After Jio Data Break

Reliance Jio, an Indian telecom upstart, compromised the personal data of over 100 million customers. This has prompted a call for increased data protection laws in India. At present, companies in India do not have to...more

DeepMind Deal with NHS Trust Reveals Privacy Concerns

Back in 2015, DeepMind, a Google company, signed a deal with the Royal Free NHS Foundation Trust. The deal allowed DeepMind access to 1.6 million patients health information as well as the ability to develop an app called...more

Data Classification and Information Security are Intertwined

A recent report entitled “Information Strategy 2017”, published by the Information Coalition finds that information security remains a top priority for over 90 percent of organizations. Given that the number of data breach...more

5 Information Governance Predictions for 2017

Information is every organization’s greatest asset. It makes up intellectual property, trade secrets and many other vital corporate assets. It’s how we in corporate America conduct business. With that said, governing and...more

Box, OneDrive, a Combination—What’s Your Flavor?

The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide