Remove Case Study Remove Education Remove Paper Remove Security
article thumbnail

E-Discovery Day

The Texas Record

ARMA International defines e-discovery as “the process of identifying, locating, securing, reviewing, and protecting electronic information and materials that are potentially relevant to specific litigation and may need to be produced to other parties.” Educational Resources. Peer-Reviewed Research Paper (PDF): John C.

article thumbnail

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Better Together in a Digital World: Security and Retention. The result is more and more of our information is born digitally; accessed and used solely via screens; stored on hard drives, servers, and in the cloud; and will eventually be deleted or transferred to a digital archive all without ever having been reduced to paper.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). We made early acquaintances with Legal and Information Security leaders. It’s about points of view.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

A lot of SMBs do not have security operations centers or SOCs. They have IT contractors who can provision laptops and maintain a certain level of compliance and security. They can provide that additional security, remotely. They have those security capabilities. In a way and then you consume the outcomes.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. KT_Follower 09/08/2008 02:24 PM Flag Have you had any requests for your case study? Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. else watch n learn.

Paper 74
article thumbnail

Tokyo 2020: when a sprint turned into a marathon

CILIP

And, from a blank sheet of paper, a safe and secure way found of hosting the world?s And then we promote the learning opportunities, including a lot of social learning, executive education and experiential observation opportunities. All the venue agreements to be renegotiated. All the plans redrawn. s biggest sporting event ?

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

While some of the measures stipulated in the order are considered table stakes like multi-factor authentication, the fact that the order exists will help to raise the collective security posture of products and services. Keatron Evans, principal security researcher, Infosec Institute. Bryson Bort , CEO, SCYTHE.