Remove Authentication Remove Case Study Remove Government Remove Paper
article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. They have located email in a number of collections, including Lieberman papers, Pelosi papers, and the American Lands Alliance collection.

article thumbnail

Why we need long-term thinking for long-term records

Preservica

Records and information governance practitioners play a vital role in easing this tension, creating dialogues and use cases to move people from a blinkered short term focus. Ensuring that long-term business critical records are authentic and readable for as long as they are needed, spans both the value and risk spectrum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The perspective is characterized by the requirement that records must possess three fundamental qualities to be considered trustworthy: accuracy, reliability, and authenticity. Chapter 9 , “Blockchain Technology and Privacy,” discusses how society’s notions of records privacy arose when records were in paper form.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

You fill out a one page piece of paper and you get cyber insurance. So maybe the government steps in and makes it easier for that organization to get insurance? And that's extremely rife with conflict as well because if I as the government come up similar to FEMA or some other organization like that, we're putting that in plain sight.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. government. government should provide and curate a catalog of resources, such as configuration, tools, etc.,