article thumbnail

[Podcast] The Impact of a Pandemic on Information Governance

AIIM

Now, as our time with COVID goes on, some of the focus has shifted from short-term business concerns like how to set up a remote working strategy , how to ensure security while working from home , and how technology might be able to help contain the spread of the virus. To now, businesses are planning for the long-term.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

What is Information Governance, and Why is it Important? There are many benefits to constructing an Information Governance program plan. How to Avoid Information Governance Pitfalls. Case studies and examples of peers in other organizations can be powerful techniques. We'll also cover some strategies to avoid them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

Here are the core components the security community knows: Govern (GV): Sets forth the strategic path and guidelines for managing cybersecurity risks, ensuring harmony with business goals and adherence to legal requirements and standards. Noteworthy updates The new 2.0 by diverse organizations.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. IT Security – Cybersecurity; Access Controls; Breach Detection. PDF of Presentation.

article thumbnail

CIPL Publishes New White Paper on the Approach of British Columbia, Canada to Cross-Border Data Transfers by Public Sector Bodies

Hunton Privacy

On June 10, 2022, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a white paper entitled “ Local Law Assessments and Online Services – Refining the Approach to Beneficial and Privacy-Protective Cross-Border Data Flows A: Case Study from British Columbia.”

Paper 101
article thumbnail

Monsido Meets Digital Sovereignty Requirements with Cloud Key Management

Thales Cloud Protection & Licensing

Organizations need to ensure the security and compliance of their data, which can be challenging when data is spread across multiple jurisdictions with different legal and security requirements. Government customers tend to be on the safe side, we were hearing from prospects that this is something they would like to see.”

Cloud 71