Remove category security-breach
article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20

Privacy 97
article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The first category is a new twist on an old criminals’ favorite: blackmail-based extortion. 1] Diamant, A. 2018, April 11).

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses.