Remove Blog Remove Computer and Electronics Remove Examples Remove Insurance
article thumbnail

The U.S. Office of the Comptroller of the Currency Seeks Comment on Digital Innovation by Banks

Data Matters

electronic payments, check capture and online banking), the OCC lists some of the new technologies, the implementation of which may be hindered by ambiguous, burdensome or inflexible rules, such as blockchain, artificial intelligence, biometrics, cloud computing and big data/analytics. Comments are due by August 3, 2020.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

She shared with me a copy of the lease, which included a fraudulent ID and even a vehicle insurance card for a Land Cruiser we got rid of like 15 years ago. For example, only recently did the three major consumer reporting bureaus allow all U.S. ” PHANTOM OFFICES. ” RECYCLING VICTIMS. .” ” RECYCLING VICTIMS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., Insurance: The firm should communicate with its insurance company and review policy coverage. biometrics).

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., Insurance: The firm should communicate with its insurance company and review policy coverage. biometrics).

article thumbnail

Standardizing the Non-Standard Digital Forensics Protocol, Sort Of: eDiscovery Best Practices

eDiscovery Daily

In an unusually long blog post for Craig’s blog (dare I say a “Losey-ian” length blog post?), Of course, even the exemplar protocol isn’t perfect – it doesn’t address privilege and confidentiality concerns or forms of production, for example. 17, 2008). How do you define protocols for forensic examination in your cases?

article thumbnail

The Personnel File: Retention & Best Practices

The Texas Record

This is a great example (one of many!) Some records (for example, Grievance Records or Employee Recognition Records) can be included in all employees’ files, but they might not, depending on an employee’s individual performance or achievements. So here comes the oft-asked question: how long do you keep personnel files?

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. As an example of a CSF, Table 1 defines the capabilities for CS to progress from Level 1 to Level 5.