Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 162

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 116

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

[Podcast] Pepsi's AP Automation Case Study

AIIM

The company's four largest European entities were still keying invoicing and credit memo data manually for all of their accounts payable processes. On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

The Data Breach Case Study & Protection Guide

Record Nations

Even the tiniest security gap can lead to a data breach. million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Data Breach/ID TheftAfter a $5.5

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case. social media ediscovery social media collection discovery data collection capture litigation online investigation social media investigation Hanzo eDPM Advisory

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage. Accordingly, I decided to use this case study as the basis for a blog entry. The PKGREL parameter of a Db2 subsystem's distributed data facility is the "on/off switch" for high-performance DBATs.

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. At this point, the presentation transitions to the planning and execution of the data mapping project, conducted by KPMG.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. The kind of application we're talking about here is one that accesses a Db2 for z/OS server through a TCP/IP link via the IBM Data Server Driver (or its predecessor, Db2 Connect).

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

I also requested that the reports be generated so as to have data aggregated at the connection type level (again, terminology can vary by monitor product - your instruction to the monitor might be to "order" the data by connection type, or to "group" the data by connection type). Why do I like for data in a detailed accounting report to be aggregated in this way? Not long ago, a Db2 for z/OS administrator contacted me with a request.

Today We are Launching a new Series of Information Governance Case Studies

IGI

We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners. This Snapshot highlights ways that organizations can gain insight into unstructured data and leverage existing capabilities to bring governance to the chaos.

Crawling COVID-19: What (and how) web archivists collect

Archive-It

Web archivists have already collected over 40 TB of web data from thousands of sites about the Novel Coronavirus (COVID-19) and its effects on their communities, research areas, and institutions. The IIPC’s June capture of COVID-19 data reported from Palestine. Case Studies COVID-19

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred

ChiefTech

Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. Edward's chief concerns were locking and data integrity (locking, of course, is a mechanism for preserving data integrity). In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! 26(f) conference (or later if agreed) custodians, non-custodial data sources, third party data sources and inaccessible data.

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”).

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Describing two different sets of archival data in one finding aid proved to be challenging.

COVID-19 collections and resouces: An update for web archivists

Archive-It

All current and new Archive-It partners can take advantage of special pricing for archival data storage in order to collect and preserve without limiting their scopes. Case studies. >17 TB of web data have been stored from >35,000 seed URLs among the ~200 Archive-It collections known at the time of writing. Case Studies Collaborative Collecting COVID-19 How Toby Karl-Rainer Blumenthal, Web Archivist for Archive-It.

Take your web archives to go with these Archive-It APIs and integrations

Archive-It

More than that though, it is the community of partners who share that infrastructure, shape its development, and build its corpus: nearly 700 organizations and individuals archiving over a petabyte of data across 40 billion (with a b!) However, partners also have options to preserve original data themselves, to apply custom access layers, to curate the same kinds of data and metadata as the Archive-It web application, and more. Case Studies How To

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

We had a limited data allowance available on the Colegio’s Archive-It account. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México. On July 1, 2018 Mexican voters went to the polls to decide the fate of their entire federal government: one president, 500 members of congress, and 128 senators. The results bring big changes, starting with the December inauguration of Andrés Manuel López Obrador, known better as AMLO, as president.

Analyze your Web Archives at Scale: The Archives Unleashed Cloud

Archive-It

Wayback browsing and search interfaces work for some applications, but with the rise of the digital humanities, the computational social sciences, and web science more generally, even more analysis tools can help to express archived data in new and enlightening ways. Case Studies How To

Expand the reach of Archive-It collections with these access integrations

Archive-It

OpenSearch can furthermore be used to pull data into an existing catalog of other items or item types. Are there more data points that you would include in yours? Partner data API calls enrich the “acquisition information” fields of SUNY Albany’s web archive descriptions.

Benefits of Data Vault Automation

erwin

The benefits of Data Vault automation from the more abstract – like improving data integrity – to the tangible – such as clearly identifiable savings in cost and time. So Seriously … You Should Automate Your Data Vault. Data Vault is a methodology for architecting and managing data warehouses in complex data environments where new data types and structures are constantly introduced.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

This blog describes some of the methodologies used to evaluate data using Google Analytics, as well as some challenges. In August 2015, GPO began exploring methods to analyze our Archive-It data collected through Google Analytics. Once we started reviewing the data, visitor numbers seemed out of the ordinary. Our referral data revealed the source of the high numbers from sites like free-social-buttons.com, floating-share-buttons.com, and get-free-social-traffic.com (Image 1).

Saving Local News on the Web

Archive-It

For this year’s Endangered Data Week , the Brooklyn Public Library hosted a panel discussion at its Central Library’s Info Commons Lab on the topic of “Saving Local News on the Web.” One of the goals of Endangered Data Week is to “explore the power dynamics of data creation, sharing, and retention,” and we definitely addressed those questions in our discussion. Case Studies Community Webs

7 Questions to Determine if Your Data is an Asset

AIIM

To achieve this, your data cannot be fragmented, redundant, obsolete, or inaccessible. It’s important to understand what data you have, why you have it, and why you need it - it's then that your data can be leveraged as an asset. FREE Webinar: Learn more from this Case Study on Leveraging Data to Transform Customer Experience]. Is your data an asset? Does your data have: Clear ownership and accountability? Data architects and engineers?

Data Mapping Tools: What Are the Key Differentiators

erwin

The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. Data mapping tools have always been a key asset for any organization looking to leverage data for insights. Isolated units of data are essentially meaningless. By linking data and enabling its categorization in relation to other data units, data mapping provides the context vital for actionable information.

Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. From March 2016 to March 2017, we analyzed several black markets to see how hijackers steal passwords and other sensitive data. [.].

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack. Data security Cyber security Cyber attacks Malware

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. The company’s general manager Hong Zhou Wong recently shared his experience in transforming to a data-driven organization at Domopalooza 2019 , the annual user conference for cloud-based data platform Domo. Data to Assure “Operational Rhythm” Sinar Mas is responsible for 500,000 hectares of plantation–4.5x

Fragmented Data, 1 Source of Truth: Why to Use Datorama [Webinar]

Perficient Data & Analytics

Want to connect all of your marketing data in one place in real-time? Or simply make more data-driven decisions? Real-world case studies, including a quick demo. Data & Analytics Salesforce Datorama marketing roiAttribute revenue directly to campaigns? Come learn more about Datorama, the AI-powered marketing intelligence platform serving some of the world’s biggest brands like IBM, Trivago and many more.

IT 55

[Podcast] The Impact of a Pandemic on Information Governance

AIIM

Also on this episode, an AIIM case study exploring the real-world application of Intelligent Information Management (IIM) techniques and capabilities. This case study features Alogent and their recent efforts with Silver State Schools Credit Union.

Honda Is Using IBM Watson to Drive Real Changes in Quality Assurance

Information Management Resources

This IDC Case Study examines how Honda implemented a cognitive system using text analytics to help it respond faster to customer feedback. Customer-centricity Customer data

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

This powerful technology and its massively scalable storage and operational power can crunch large sets of data, use analytics to understand it, and provide the security needed to lock it all down. Cloud Content Management has the power to change the game for businesses of all sizes and types.

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

On June 3, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published its report, What Good and Effective Data Privacy Accountability Looks Like: Mapping Organizations’ Practices to the CIPL Accountability Framework (“Report”). The Report consolidates the findings of CIPL’s Accountability Mapping Project launched in September 2019, which is part of CIPL’s broader work on the central role of organizational accountability in data privacy.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. billion usernames and passwords exposed via data breaches and traded on blackmarket forums. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

Opening the House Foreign Affairs Committee web archive

Archive-It

In total, CSUF’s web archive of the HFAC website at the end of the Royce chairmanship preserves 180 GB of data and over 69,000 individual documents. In terms of the unique value of such web archival data, press releases are text-based and thus small, as well as broadly disseminated. By contrast, CSUF’s December 2018 and January 2019 web crawls archived 882 videos, comprising some 179 GB of video data. Case Studiesby Mark G.

CCPA and the future of the health data economy

Collibra

Organizations engaging with personal healthcare data need to pay close attention to the rapidly evolving regulatory environment. Over the next few years, the compliance requirements around personal healthcare data are set to evolve at breakneck speed. Surviving and thriving in this environment of regulatory change will require a more strategic approach to managing personal data. Exploring CCPA and healthcare data.

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. Augmented reality Virtual reality Data managementI want to see where the tools make a real and lasting difference. Remote assistance is another.

29

[Podcast] Tips for Staying Cyber-Safe While Working from Home

AIIM

But, new challenges also arise with the recent boom in remote working, including cybersecurity threats like ransomware, data hacking, viruses, and more. And finally, on this episode, hear an AIIM member case study of how Laserfiche helped Mille Lacs Corporate Ventures migrate their contract management process to the cloud. Remote working comes with a number of benefits both for the employee and the employer.

CCPA and the future of the health data economy

Collibra

Organizations engaging with personal healthcare data need to pay close attention to the rapidly evolving regulatory environment. Over the next few years, the compliance requirements around personal healthcare data are set to evolve at breakneck speed. Surviving and thriving in this environment of regulatory change will require a more strategic approach to managing personal data. Exploring CCPA and healthcare data.