Remove 2017 Remove Case Study Remove Information governance Remove Risk
article thumbnail

Download IGI’s Whitepaper: Ameritas Leverages Technology For Improved Information Governance

IGI

This publication was written by the Information Governance Initiative as part of our ongoing series exploring issues, strategies, and techniques related to information governance. More information about Active Navigation is available at www.activenavigation.com. About this Publication.

article thumbnail

Why we need long-term thinking for long-term records

Preservica

Organizations simply have to fight the temptation to always stay in the present and think about the longer term accessibility of valued information assets. Records and information governance practitioners play a vital role in easing this tension, creating dialogues and use cases to move people from a blinkered short term focus.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

With the advent of technology platforms that allow for indexing of documents/data, including Microsoft O365, developing processes around the technology will be transformative for the management of information. Hear lessons learned and case studies on: (i) the record classification of 1.5 RAS Enterprise Risk Management.

article thumbnail

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Next week during the show, I’ll cover the sessions each day that relate to eDiscovery, Information Governance, Cybersecurity and Data Privacy to give you a complete sense of options. Manager – eDiscovery & Legal Operations – Sanofi US, Melissa DeHonney, Corporate Counsel – Information Governance – Novo Nordisk, Inc.,

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

At its core, malware exploits existing network, device, or user vulnerabilities , posing as little a risk as annoying advertisements to the much more damaging demand for millions of dollars in ransom. By avoiding third-party app stores and investigating app data before downloading, users can significantly mitigate this risk.

Phishing 104