Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Because it was spending too much time creating archives that often didn’t meet its needs, United needed a dynamic capture method that would operate automatically and preserve all of its website content in a functional, future-proof format. Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website.

RMS Section Meeting: teasers!

The Schedule

As the Annual SAA virtual meeting and the Records Management Section virtual meeting approaches, we want to bring your attention to the fabulous panel we planned: The Records Manager in the Library (panelists: Jessika Drmacich, Williams College; Krista Oldham, Clemson University; Eric Stoykovich, Trinity College-Hartford; Greg Wiedeman, University at Albany, SUNY; Elizabeth Carron, Boston College; Hillary Gatlin, Duke University ).

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Crawling COVID-19: What (and how) web archivists collect

Archive-It

In this case, that digital space is less a parallel publishing platform for institutions than a subject in and of itself, with context and character of its own to capture and represent. Case Studies COVID-19by Karl-Rainer Blumenthal, Web Archivist for Archive-It.

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”).

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. The text archiving plan presented at that December committee meeting, to me, risked committing some of the same mistake. This is, as mentioned, a bit of a saga, This may or may not be footage from the meeting. Tomorrow: the meeting with IT/Legal and what came after (or: “Brad trips over his own feet”). Welcome to RIM Month!

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. This post summarizes the highlights from this meeting. In light of this, the (A) Committee granted an extension of the model law development request to the Spring 2019 National Meeting. The post Regulatory Update: NAIC Fall 2018 National Meeting appeared first on Data Matters Privacy Blog.

Paper 65

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community

Archive-It

Our advantage was that we had such relationships, and could pitch the idea not only through traditional means like press releases and social media, but by chatting after meetings typically spent coordinating film screenings, gallery walks, and lawn concerts. by Dylan Gaffney, Forbes Library.

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library

Archive-It

By practicing this type of collecting now, we will be prepared to meet the challenge of curating our digital vertical file as this shift takes place. Archiving Spontaneous Events Case Studies Community WebsBy Emily Ward, Digital Archivist, East Baton Rouge Parish Library.

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

Web archiving partners meet in 2019

Archive-It

Archive-It partners met twice this month: attendees of the joint Society of American Archivists and Council of State Archivists conference met at the University of Texas at Austin, and the first regional meeting of Archive-It partners in New England convened at Harvard University’s Lamont Library. Both events featured program and technology updates from Internet Archive staff, news and case studies from Archive-It partners, and informal time for discussion and working groups.

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

The town has several active civic organizations and clubs, and residents participate in a Town Meeting form of government wherein all of the voting members of town gather twice per year to decide how the town will be governed. And because of the way that our modern interaction is so heavily mediated by digital technologies, it is important to meet and document the changes and trends as they are represented there. Case Studies Community Webs

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

Understanding how our archived content is meeting the needs of users has become increasingly important to us to ensure we are meeting our goals for access. Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S. Government Publishing Office (GPO).

SAA Austin Recap #2! Acquisitions & Appraisal & Electronic Records Section Joint Section Meeting!

The Schedule

Acquisitions & Appraisal + Electronic Records Section Joint Section Meeting at ARCHIVES*RECORDS 2019 . On August 3, 2019, members of the Acquisitions & Appraisal Section of the Society of American Archivists joined members of the Electronic Records Section for a combined annual meeting. Business Meetings. The lightning round was followed by a case study of a student project on appraising electronic state agency records?. Author: Scott Kirycki.

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

In this case, why are three heads better than one? NYARC’s Archive-It collections are devoted to our institutional websites, NYARC’s own website and project sites, art-rich websites of significance to the study of art and art history, artists’ websites, auction house sites and their embedded catalogs, catalogue raisonnés, sites of NYC galleries and art dealers, and sites dedicated to restitution efforts and provenance of artworks that may be lost, stolen, or looted.

APEC Privacy Update – Beijing Meetings

Hunton Privacy

On August 6-10, 2014, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Beijing, China, for another round of negotiations, meetings and workshops. The principal focus of the meetings was again on the further implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system and related work relevant to cross-border interoperability. Next Meeting.

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. The following is a summary of highlights and outcomes from the meetings. The case studies explored the usefulness of the Referential and how companies can leverage their prior work to seek approval in one system to gain approval in the other system.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.

Retail Privacy Network

Data Matters

You are invited to join privacy professionals in the retail sector for topical conversation, learning and networking at the first Retail Privacy Network meeting. This interactive meeting will include hot topics in UK/EU data privacy and cybersecurity with practical case studies on retail industry issues. The agenda will include discussions on: Lessons learned from GDPR enforcement actions and update on cookies. Erasure and back-ups.

Opening the House Foreign Affairs Committee web archive

Archive-It

Among hundreds of others, they include this September 27, 2018 HFAC committee meeting video, including Chairperson Royce speaking forcefully about H. Case Studiesby Mark G. Bilby, Senior Assistant Librarian, California State University, Fullerton. Videos of 2013-2019 House Foreign Affairs Committee (HFAC) hearings unavailable from C-SPAN are now available for public viewing from a new web archive curated by California State University, Fullerton.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

Given the topic of the conference, many of the presentations centered around information governance and implementation whether in the cloud, SharePoint, or through successful case studies. All in all, the conference was a huge success with registration meeting capacity several weeks before the event and we look forward to using the excitement and momentum to plan e-records 2018.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Machine to machine connection and communication needs to be authenticated to access systems, so this technology is where the rubber meets the road, with respect to this debate. In this case it’s an encryption key. Venafi: Cambridge Analytica is just an amazing case study of what can happen when machines can actually pull all this information together, and the massive power of that.

Connect with Perficient at #Kscope18

Perficient Data & Analytics

Visit us at booth #312 to meet with subject matter experts and thought leaders and learn how we’ve leveraged our extensive expertise in Enterprise Performance Management (EPM) , Enterprise Resource Planning (ERP) , Business Intelligence and Analytics (BI) , and Customer Experience (CX) to drive digital transformation for our customers. Case Study: Implementing a One-of-a-Kind Driver-based Rolling Forecast Model at MD Anderson Cancer Center Using Hyperion Planning with ASO Integration.

How to become an ISO 27001 lead implementer

IT Governance

You will be tasked with overseeing an ISO 27001 project, managing personnel and making sure you meet the Standard’s requirements along the way. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies.

Risk 61

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Government is transforming to meet its partners in this brave new digital world. On November 15, the Texas State Library and Archives Commission and the Texas Department of Information Resources will bring together speakers to share case studies and presentations to help Texas governments achieve the benefits of digital transformation and overcome its challenges. Better Together in a Digital World: Security and Retention. TSLAC @TexasDIR.

How to start your career in cyber security

IT Governance

Meeting people and making connections is a great way to get your foot in the door. Networking websites such as LinkedIn can be helpful, but we’d suggest face-to-face meetings wherever possible. This one-day course: Was designed by the same experts who led the world’s first successful ISO 27001 implementation project; Gives you the opportunity to participate in group discussions and practical exercises, and review case studies; and.

Singapore Updates Its Model Artificial Intelligence Governance Framework

Data Protection Report

On 21 January 2020 at a meeting at the World Economic Forum, the Personal Data Protection Commission ( PDPC ) and Infocommunications Media Development Authority ( IMDA ) released the second edition of its Model Artificial Intelligence (“ AI” ) Governance Framework (“ Model Framework” ). The Compendium of Use Cases. The Compendium of Use Cases sets out various case studies of organisations which have operationalised the principles from the Model Framework.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. Meeting people and making connections is sometimes essential for getting your foot in the door. Networking websites such as LinkedIn can also be helpful, but face-to-face meetings are much more effective. There has never been a better time to get into cyber security.

Successful Information Governance when the Bosses Just Don't Care

AIIM

In all cases, case studies and stories can really help make the case. Certainly, on the risk side, you hope to never have a case study from your own organization - but if you do, it's hard to find one more relevant because you know what happened, you know the costs to recover, you know all the outcomes. We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events.

Poster boy for Information Governance

InfoGovNuggets

Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. Then he wrote a memo ostensibly commemorating a meeting he had with his boss on government business on a government computer (while in a government vehicle) during the work day, and declared that that was his personal correspondence that he could (and did) distribute as he pleased.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences. Late last year, Atrium Health disclosed it lost sensitive data for some 2.65

Risk 120

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. After all, what company leaders would see as the benefit of real-time data and complete transparency of information could be seen as a loss of control to a department manager who used to have time to “smooth” over her department’s data and prepare her version of the story before going into a meeting.

New Functional Schedule for North Carolina State Agencies

The Schedule

Over 200 stakeholders from across North Carolina state government participated in meetings to review draft schedules for each of the 16 functions, and many staff at SANC in addition to the Records Analysis Unit also provided constructive feedback. For a more in-depth look at the process behind this project, check out the case study published by SAA’s Government Records Section.

5 best online cyber security training courses and certifications in 2020

IT Governance

To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without jeopardising your health. This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies.

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

In the past, the security of a company’s information was something that was delegated to the IT department and the subject was seldom brought up in board meetings. In board meetings nowadays, one of the most important agendas that is given priority in the discussion is cybersecurity.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

This blog explains why that’s the case, helping you understand how each standard works and the differences between them. To meet these requirements, organisations must: Assemble a project team and initiate the project; Conduct a gap analysis; Scope the ISMS; Initiate high-level policy development; Perform a risk assessment; Select and apply controls; Develop risk documentation; Conduct staff awareness training; Assess, review and conduct an internal audit; and.

Privacy and Cybersecurity May 2019 Events

HL Chronicle of Data Protection

Bret Cohen will speak on the Privacy Bar Section Forum panels, “Working Across Borders: Partnering and Vetting,” and “Case Study: How Working Across Borders Worked for Me,” during the 2019 IAPP Global Summit. Mark Brennan will lead a discussion on TCPA issues at the Student Loan Servicing Alliance’s Annual Meeting. Please join us for our May events. May 1. IAPP Global Summit.

BRIEFING NOTE: School librarians empower thriving schools

CILIP

For more information on the campaign and to download case studies illustrating the role of professional librarians in delivering thriving schools, visit [link]. s a simple checklist to help ensure that you are getting the most from your librarian: Meet with them and ask them to show you how they can help deliver your school?s Invite the librarian to speak at a staff meeting about the new role of the school library.

Kofax Intelligent Automation Deployment at Davies Turner Wins Ventana Award for Overall Digital Leadership

Document Imaging Report

Kofax has empowered our operations teams to build automated processes that enable improved accuracy and faster response times to meet and even beat clients’ requirements,” said Hollis.

Advocating for digital preservation through better corporate governance

Preservica

Last month I attended the ICA Section for Business Archives meeting which was held at the Levi Strauss HQ in San Francisco. You can find other useful resources and case studies on our Corporate and business archives page. It was an inspiring and very well-organized event attended by over 100 business and corporate archivists with a further 100 watching online.

The 2013 Summit Arrives: Bridging Data And Humanity

John Battelle's Searchblog

At the Summit, you’ll meet the people behind this world, as well as the agencies, marketers and brands who power it. We’ll continue our tradition of rigorous, in depth interviews, practical case studies, and eye-opening “high order bits” that will challenge traditional thinking and provide context for doing business in a data-driven world. The post The 2013 Summit Arrives: Bridging Data And Humanity appeared first on John Battelle's Search Blog.