Remove 10
Remove 2008 Remove 2017 Remove Computer and Electronics Remove IT
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Here, Part 3 discusses how to manage the various DT risks.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

10 At that time, it was aimed most squarely at curbing the types of duplicative, excessive, “scorched earth” discovery practices that were prevalent — i.e., at the problem of so-called “overdiscovery.”11 Private matters were discoverable by default, even where the privacy interests were significant and the relevance only marginal.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: NCSC and Kaspersky, parliamentary passwords and macOS High Sierra (again)

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 8 December 2017. Dorries tweeted : “My staff log onto my computer on my desk with my login everyday. For the officer on @BBCNews just now to claim that the computer on Greens desk was accessed and therefore it was Green is utterly preposterous !!”.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Data is not just a resource for better marketing, better service and delivery.

GDPR 120