Remove Blog Remove Computer and Electronics Remove Government Remove Video
article thumbnail

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Let’s look at the series, both on the Local Government and State Agency Schedule. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records. 13 TAC 6.94.

article thumbnail

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Let’s look at the series, both on the Local Government and State Agency Schedule. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records. 13 TAC 6.94.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

In this case involving alleged child-pornography activities, agents of the Office of Attorney General (“OAG”) executed a search warrant at Appellant’s apartment based upon a video found to contain child pornography being shared via a peer-to-peer file-sharing network (eMule) from an IP address associated with the appellant.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Take a look at every data breach and cyber attack that we recorded in May in this blog. Meanwhile, you can stay up to date with the latest news by subscribing to our Weekly Round-up or visiting our blog. Wright County, MN, government notifies those affected by cyber attack (12,320). Cyber attacks. Data breaches.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

Now, Tom has written another terrific overview for Understanding eDiscovery in Criminal Cases that we’re happy to share on the eDiscovery Daily blog. When possible, we will include a video that hopefully illustrates and illuminates the concept. If a picture is worth a thousand words, a video is worth many thousand words, right?

article thumbnail

Embracing new ways of working in financial services

CGI

Although the approaches to dealing with the COVID-19 pandemic vary by country, as governments and businesses come to grips with it, one thing is imperative: we will get through this. . Electronic payment volumes will decrease even as contactless payment adoption increases. Embracing new ways of working in financial services.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”