Remove tag personally-identifiable-information
article thumbnail

What is metadata management and why is it important?

Collibra

Metadata management is a cross-organizational agreement on how to define informational assets for converting data into an enterprise asset. Some consider metadata as “what identifies data.” Again, a partial definition. . What is Metadata? Managing metadata begins with defining metadata correctly. For example, .

article thumbnail

What is metadata management?

Collibra

Metadata management is a cross-organizational agreement on how to define informational assets for converting data into an enterprise asset. Some consider metadata as “what identifies data.” ” Again, a partial definition. What is the business definition of this data element? What is Metadata?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Proposes Cybersecurity Rules for Public Companies

Hunton Privacy

Key Definitions. Under the proposed rules, the following key terms are defined as follows: “Cybersecurity incident” means an unauthorized occurrence on or conducted through a company’s information systems that jeopardizes the confidentiality, integrity, or availability of its information systems or any information residing therein.

article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

I’m training and running the marathon to improve my health, to improve my own personal record. Yeah, I think there's definitely a well-established Jeopardy style like flavor and style of capture the flag. So getting cybersecurity education materials often comes with a price tag. Hacking has an event that’s similar.

article thumbnail

What Are My Photos Revealing About Me? You may be accidentally sharing personal information in your photos (an important Guest Post)

Architect Security

You may be accidentally sharing personal information in your photos. For years, tech savvy people have known that photos shot on your phone contain lots of information that you may not want revealed. So how easy is it for someone to identify the people in the photos that you post online? By: Jon Keegan.