Finally, after providing the building blocks for strong Information Governance (IG) programs and operationalizing that framework, we discuss how to sustain your IG program in the last part of the series. An effective IG...more
Last week, we introduced you to the ARMA IGIM Framework. What’s next? Every successful Information Governance (IG) program starts with a strong base....more
Are you storing sensitive data on a shared network drive? If so, your organization could be at serious risk of a data breach or privacy lawsuit. Shared drives, like the common “S:\ drive,” are often used to store documents,...more
Artificial Intelligence (AI) is rapidly transforming the legal landscape, offering unprecedented opportunities for efficiency and innovation. However, this powerful technology also introduces new challenges to established...more
The rapid advancement of artificial intelligence (AI) technologies is reshaping the corporate landscape, offering unparalleled opportunities to enhance customer experiences and streamline operations. At the intersection of...more
Generative Artificial Intelligence (Gen AI) is transforming industries at an unprecedented pace, unlocking new possibilities in automation, creativity, and problem-solving. However, as we look toward 2025, the success and...more
CYBERSECURITY -
SEC’s Hacked X Account Leads to Tumultuous Bitcoin Market -
The Securities and Exchange Commission has confirmed that its X account “was compromised, and an unauthorized post was posted.” The SEC...more
1/12/2024
/ 23andMe ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Genetic Materials ,
Hackers ,
Information Governance ,
Personally Identifiable Information ,
Securities and Exchange Commission (SEC) ,
State Data Privacy Laws ,
Twitter
In today’s digital age, our every action generates a trail of data. From online searches to credit card details, this data is collected by companies to enhance their services. However, the question arises – how long should...more
CYBERSECURITY -
TechRadar's Cyber Predictions for 2024 are Spot On -
Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more
1/9/2024
/ Artificial Intelligence ,
China ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Hackers ,
Information Security ,
Machine Learning ,
National Security ,
Ransomware ,
Social Media ,
State Bans ,
TikTok
Information governance has evolved rapidly, with technology driving the pace of change. Looking ahead to 2024, we anticipate technology playing an even larger role in data management and protection. In this blog post, we’ll...more
Information governance and data retention have been important topics in the corporate world for years. As an executive, it’s crucial to ensure effective management, storage, and secure disposal of your company’s data. Having...more
CYBERSECURITY -
Chinese and Russian Hackers Targeting COVID-19 Vaccine Makers in U.S. Crosshairs -
Last week, authorities from the United States, the United Kingdom and Canada accused a well-known hacker group tied to...more
7/27/2020
/ China ,
Coronavirus/COVID-19 ,
Cyber Attacks ,
Data Breach ,
Data-Sharing ,
Driverless Cars ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Microsoft ,
Ransomware ,
Russia ,
Vaccinations
The COVID-19 pandemic has certainly forced companies to innovate and explore new ways of working across its workforce and client base. Some have decided to dive head first into implementing collaboration technologies such as...more
It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
9/4/2018
/ Airspace ,
Arbitration ,
Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
Commercial Use ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Do Not Call List ,
Drones ,
Emerging Technology Companies ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Safety Standards ,
Southwest Airlines ,
Unmanned Aircraft Systems
The U.K. data privacy watchdog reports that the number of complaints received since the EU’s General Data Protection Regulation (GDPR) took effect three months ago has almost doubled. ...more
It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more
Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3. The corps has been in existence for three years but not statutorily deployed. ...more
11/10/2017
/ Consumer Financial Protection Bureau (CFPB) ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data-Sharing ,
Drones ,
Drug & Alcohol Abuse ,
Elder Issues ,
Financial Services Industry ,
Hackers ,
Health Care Providers ,
HIPAA Breach ,
Malware ,
Opioid ,
Pain Management ,
Personally Identifiable Information ,
PHI ,
Ransomware ,
State Data Breach Notification Statutes ,
Unmanned Aircraft Systems
It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more
11/7/2017
/ Analytics ,
Artificial Intelligence ,
Blockchain ,
Chief Information Officers (CIO) ,
Cloud Computing ,
Connected Items ,
Cybersecurity ,
Distributed Ledger Technology (DLT) ,
Driverless Cars ,
Information Technology ,
Internet of Things ,
Robotics ,
Technology Sector ,
Virtual Reality
Today, the Spanish data protection agency (AEPD) fined Facebook 1.2 million euros ($1.4 million USD) in connection with how the company collects personal data for advertising purposes. The AEPD said Facebook did not get...more
In less than 300 days, the European General Data Protection Regulation (GDPR) will go into effect and forever change the privacy landscape. Leading industry organization, Gartner, Inc., predicts that more than 50 percent of...more
Reliance Jio, an Indian telecom upstart, compromised the personal data of over 100 million customers. This has prompted a call for increased data protection laws in India.
At present, companies in India do not have to...more
Back in 2015, DeepMind, a Google company, signed a deal with the Royal Free NHS Foundation Trust. The deal allowed DeepMind access to 1.6 million patients health information as well as the ability to develop an app called...more
A recent report entitled “Information Strategy 2017”, published by the Information Coalition finds that information security remains a top priority for over 90 percent of organizations. Given that the number of data breach...more
Information is every organization’s greatest asset. It makes up intellectual property, trade secrets and many other vital corporate assets. It’s how we in corporate America conduct business. With that said, governing and...more
The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more