Remove 2013 Remove Libraries Remove Paper Remove Security
article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

We held over fifty stakeholder meetings between October of 2013 and April of 2015. We made early acquaintances with Legal and Information Security leaders. Our initial client service engagements—managed offsite storage and retrieval, secure document shredding, digitization, and, recently, electronic redaction—began in March of 2014.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have been a member of the OAR staff at the ANO since March 2013. These floors contain offices, a record center, a library and researcher area, a processing area, and the archives. Overall, we had to move close to 1,000 boxes, unboxed and unprocessed papers, and objects of various sizes from the sixth floor to the fourth.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

Compromised data includes names, passport numbers, Social Security numbers, online crypto account identifiers and bank account numbers. Publicly disclosed data breaches and cyber attacks: in the spotlight Criminal hackers threaten to leak World-Check screening database A criminal group known as GhostR claims to have stolen 5.3

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. But lobbying strategies are not always so blunt, and the interests involved are not always so obvious. And that turns out to be a critical piece of creating an AI lobbyist.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

It will ensure that libraries can continue to archive material, that journalists can continue to enjoy the freedoms that we cherish in this country, and that the criminal justice system can continue to keep us safe. How then will we secure adequacy without adhering to the charter? Where she finds criminality, she can prosecute.

GDPR 120
article thumbnail

CKG Longlist 2020

CILIP

Walker Books receives 10 entries on the longlist while independent publisher, Book Island, secures its first listing. On the Carnegie longlist Paper Avalanche , written by Lisa Williamson , focuses on the wellbeing of children in the care of parents with mental illnesses, while Randy Ribay ?s The winners will each receive ?500