eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Privacy – Confidential Information; Risk; PCI; PII. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

Bringing Control to Information in a Cloud-First, Office 365 World: New IGI Case Study


We recently launched our new series of case studies about how professionals like you are tackling IG. In the first Snapshot we looked at how privacy compliance and IG work hand-in-hand to reduce risk and increase information value. You can read this use case and others here. IG Snapshots are compact case studies drawn from IGI’sinterviews and discussions with our community of IG practitioners.

Risk 20

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Today We are Launching a new Series of Information Governance Case Studies


We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners. Our first Snapshot focuses on the interplay between IG and privacy by telling the story of Sarah, an attorney in a large pharmaceutical company who leveraged GDPR compliance momentum to build a broader IG program.

Privacy and Cybersecurity May 2019 Events

HL Chronicle of Data Protection

Bret Cohen will speak on the Privacy Bar Section Forum panels, “Working Across Borders: Partnering and Vetting,” and “Case Study: How Working Across Borders Worked for Me,” during the 2019 IAPP Global Summit. Cybersecurity and Privacy: Can They Coexist? News & Events AI cybersecurity Hacking privacy TCPAPlease join us for our May events. May 1. IAPP Global Summit.


IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].


FTC Releases Summary of Workshop on Privacy Disclosures

Hunton Privacy

The workshop, which was held on September 15, 2016, examined ways of testing and evaluating company disclosures regarding advertising claims and privacy practices. The workshop covered disclosure effectiveness, case studies and future approaches, and applications to disclosure design. On November 30, 2016, the FTC released a staff summary (the “Summary”) of a public workshop called Putting Disclosures to the Test.

APEC Privacy Update – Beijing Meetings

Hunton Privacy

On August 6-10, 2014, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Beijing, China, for another round of negotiations, meetings and workshops. The principal focus of the meetings was again on the further implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system and related work relevant to cross-border interoperability. Cross-Border Privacy Rules for Processors.

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

At the International Association of Privacy Professionals’ (“IAPP’s”) recent Europe Data Protection Congress in Brussels, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) led two panels on the risk-based approach to privacy as a tool for implementing existing privacy principles more effectively and on codes of conduct as a means for creating interoperability between different privacy regimes.

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. APEC Privacy Recognition for Processors. The case studies explored the usefulness of the Referential and how companies can leverage their prior work to seek approval in one system to gain approval in the other system.

Destroying Barriers to Destruction


While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey. A CEO of a global tech company recently told me that it’s his mission to define the minimum amount of data his business requires for ML and AI in order to contain costs and reduce exposure of data to privacy and security risk.

e-Records 2019 Call for Presentations

The Texas Record

The one-day conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned.

CCPA and the future of the health data economy


Not surprisingly, today most individuals do not understand when their healthcare data is protected by data privacy rules and when it is not. The impact of the CCPA on healthcare data privacy compliance will be significant, and so it makes a good case study for understanding what is to come.

CCPA and the future of the health data economy


Not surprisingly, today most individuals do not understand when their healthcare data is protected by data privacy rules and when it is not. The impact of the CCPA on healthcare data privacy compliance will be significant, and so it makes a good case study for understanding what is to come.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. but the proliferation of digital records has necessitated new tools for managing privacy.

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

The report focuses on privacy concerns associated with facial recognition technology, which is becoming increasingly ubiquitous across a variety of commercial applications ranging from search engines to video games to password authentication. These best practices are based on the principles contained in the FTC’s March 2012 report on privacy and include: (1) privacy by design, (2) simplified consumer choice and (3) transparency.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Privacy Shield , as well as the new EU privacy rules known as General Data Protection Regulation or GDPR. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Risk 121

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

At issue is the applicability of the Supreme Court of Pennsylvania’s decision in the case of Warrantech Consumer Products Services, Inc. Instead, RITF decided to monitor developments in the pending cases and to research the extent to which the Pennsylvania statute at issue in Warrantech differs from similar laws in other states. The post Regulatory Update: NAIC Fall 2018 National Meeting appeared first on Data Matters Privacy Blog.

Paper 65

Welcome to Legaltech New York 2019!: eDiscovery Trends

eDiscovery Daily

Our session will explore best practices of data management and issues relating to document retention, records management, litigation hold policies, legal preservation, data privacy, and discovery management. Case studies with best practices, ROI benefits and efficiencies achieved.

CNIL Adopts Referentials On DPO Certification

Hunton Privacy

According to the CNIL, this consultation helped it strike “the most appropriate balance” between the knowledge and skills that a DPO must have and the expectations of privacy professionals. Candidates also will need to successfully complete a written test that will consist of at least 100 multiple choice questions, 30% of which will be presented in the form of case studies.


Can Enterprises execute a GRC Movement?

Security Affairs

Governance Risk and Compliance (GRC) is about managing your enterprise data effectively but with data comes its security and privacy concerns too. Which means the threat to people and their privacy would always increase! If yes then what kind of use cases?

Risk 102

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Hear lessons learned and case studies on: (i) the record classification of 1.5 Our panelists will analyze the most recent enforcement proceedings and lawsuits and also discuss the GDPR and Privacy Shield compliance and litigation trends they foresee for 2019.

Cloud 39

Resourceful Records Managers! Courtney Bailey, Chair, SAA Records Management Section 2019-2020

The Schedule

Whenever I had the opportunity to focus my own research, I tried to focus on a topic that would fill in a gap for me, and in this case, I looked into records management in the business arena. You can find all the details in the case study I wrote for the Government Records Section.). I also think maintaining privacy is a big challenge for records management, especially as more and more records are created and maintained electronically.

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

In one area we could have done better, but I knew that would be the case going in and will explain why. Believe me, this process is not fun and I had many painful conversations with excellent consultants and experts (personal friends in many cases) as to why they could not attend.

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Contextual approach to privacy ,” which includes questions such as, “What do content creators believe about their right to privacy on the web? How does their personal context shape their understanding and expectations of privacy and anonymity?”. Social network theory of privacy”, which emphasizes that users’ “expectations regarding their privacy [is]…based on the number, depth, and breadth of connections that users have on the web”. Author: Steven Gentry.

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Next week during the show, I’ll cover the sessions each day that relate to eDiscovery, Information Governance, Cybersecurity and Data Privacy to give you a complete sense of options. OK, everybody gets hung up on Legalweek vs. Legaltech®.

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

The EA scope includes a heavy focus on enterprise "universal" information management and governance, infused (particularly in the Public Sector) with the currently vogue philosophies of SOA, Open Data, Mobility, Privacy-by-Design (PbD) and Cloud Computing.

Sharing best practices in our new Data to Diamonds book


Therefore, in “Data to Diamonds,” we highlight the business value realized in a wide range of industries and business functions, featuring case studies derived from CGI client engagements. Guidance for ensuring your customers’ trust by protecting their data and respecting their privacy.

Welcome to Relativity Fest 2019!: eDiscovery Trends

eDiscovery Daily

Chief legal officers provide a unique perspective, and to analyze that perspective, Relativity and the FTI Technology business unit of FTI Consulting commissioned a study by Ari Kaplan Advisors, surveying general counsel on a wide variety of legal issues affecting business and the legal profession.

Reflecting on Enterprise 2.0 for Information Professionals


The Ernst & Young Facebook case study also raised some interesting issues about online identity if you are asked to represent your organisation online - there is a real need for the employer to ensure the employee understands how to protect their privacy in the Web 2.0 Last week I attended the second day of Key Forum's Enterprise 2.0 for Information Professionals conference and I blogged some short summaries of each presentation.

Download IGI’s Whitepaper: Ameritas Leverages Technology For Improved Information Governance


headquartered in Lincoln, Nebraska, clearly makes such a case. The requirements of the regulation are far reaching and extend from information security and data governance, through access controls, identity management, systems and network monitoring, data privacy, environmental controls, risk assessment and incident response. About this Publication.

Download IGI’s Whitepaper: GDPR Myths & Misconceptions


In fact, in 2018, “the most important data privacy regulation in 20 years” will go into effect. Sign up here to join the IGI Community to access our extensive library of IG research and tools including our Annual Report, whitepapers, case studies, infographics, and more. This publication was written by the Information Governance Initiative as part of our ongoing series exploring issues, strategies, and techniques related to information governance.

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

KT_Follower 09/08/2008 02:24 PM Flag Have you had any requests for your case study? Privacy Policy | Terms of Use Around the network

Paper 76