Remove 2002 Remove Government Remove Paper Remove Security
article thumbnail

Sarbanes-Oxley Act and Record Retention Best Practices

Armstrong Archives

The Sarbanes-Oxley Act (SOX) is a law passed in 2002 that sets forth standards for the recording and reporting of financial activities. It may even violate other regulations such as those governing client privacy. This massively reduces the physical space needed to store them, and it also facilitates security and retrieval.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

While these RIM practices are still important to help ensure governance, compliance, and manage risks, it is also important to realize that information is both a product and a service. Before, travellers booked their trips through agents, who issued paper tickets, confirmations, car-rental documents, and so on.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. One of an intranet's most obvious virtues is its ability to slash the need for paper. wrote a paper started to warn: "Is Your Intranet the Wild West?". But intranets quickly became victims of their own success.

Cloud 89
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. One of an intranet's most obvious virtues is its ability to slash the need for paper. wrote a paper started to warn: "Is Your Intranet the Wild West?". But intranets quickly became victims of their own success.

Cloud 40
article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. He’s the author of the acclaimed Threat Modeling: Designing for Security.

Cloud 40
article thumbnail

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002. Many experts have described the infusion of money as being too little too late, including former Facebook security chief Alex Stamos, who led Facebook’s response to Russian meddling in 2016. “In The post Better Late than Never?