Remove Privacy-Policy
article thumbnail

Ensuring AI-readiness with secure information management (SIM) 

OpenText Information Management

Real-world example: In March 2023, a vulnerability in the Redis library used by ChatGPT led to a data breach , exposing sensitive user information. By using policies to discover and classify data based on sensitivity, SIM ensures data confidentiality throughout its lifecycle. secure when in-use, in-transit, and at-rest.

article thumbnail

Data Disposition: What is it and why should it be part of your data retention policy?

AIIM

Most often, this means destruction, though it can also mean transfer to another organization in some cases – for example, to a corporate archive if it has historical value. Connect legal, privacy, and regulatory retention obligations directly to relevant information.

IT 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

A new form of agile cryptography must get established in order to robustly preserve privacy and security as all this raw data gets put to commercial use. Karasawa cites the example of a company email server that has a public key and issues private keys to all its users. And the couple’s privacy will need to be preserved.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Today’s post is mainly in response to “ Digital Media and the Case of the Missing Archives ,” written by Danielle Tcholakian who in turn seems to have been inspired by an article in the Columbia Journalism Review. So let us start a mutual conversation with me first asking journalists, what do you mean by “archives”?

article thumbnail

Understanding and Documenting the Basis of Retention Periods

ARMA International

A retention schedule is one of the most fundamental aspects of a records management policy. For example, OSHA (Occupational Safety and Health Act) regulations 29 CFR 1904 et. That is just one example of many regulations that specify retention periods. A training presentation for example, or a product announcement.

article thumbnail

A February 2020 Surprise: California Attorney General Proposes Significant Revisions to CCPA Regulations

Data Matters

Just as companies were starting to recover from their exertions to put in place California Consumer Privacy Act (“CCPA”) compliance programs before the law’s January 1, 2020 entry into force, the California Attorney General (“AG”) provided an early February surprise. Clarifications with respect to employee notifications (§ 999.305).

Privacy 66
article thumbnail

Defensible Disposition Program: Article One—Let’s get down to Basics

ARMA International

Sometimes, those records need to be revisited or referenced later down the road in connection with, for example, taxes, audits, or other reviews. It could also result in a violation of the ever-growing number of privacy regulations emerging around the globe.