article thumbnail

GDPR and The Data Governance Imperative

AIIM

Three Critical Steps for GDPR Compliance. GDPR Compliance Starts with Data Discovery. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information.

GDPR 92
article thumbnail

Cellebrite 2019 Report on Industry Trends for Law Enforcement: eDiscovery Trends

eDiscovery Daily

Drivers for compliance and investigations are growing to the point that discovery activities are about as likely to support those needs as they for litigation. The survey focused on the impact of digital data in investigating and prosecuting criminal cases including: What types of digital sources are being used in investigations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR). With the introduction of GDPR, data protection compliance becomes increasingly risk-based.

Cloud 40
article thumbnail

AI, Records, and Accountability

ARMA International

For years, records management has been helping organizations address emerging legal and ethical challenges such as information privacy, compliance, and eDiscovery. AI refers to computer systems that are able to perform tasks that are considered to require human intelligence – that is, cognitive tasks. Definitions of AI.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. While these RIM practices are still important to help ensure governance, compliance, and manage risks, it is also important to realize that information is both a product and a service. Intelligent Capture.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

Among other news: Lancashire-based Lad Media was wound up , and its director, Keith Hancock, was banned from forming or managing an organisation for four years, after the company was deemed to have violated the PECR (Privacy and Electronic Communications Regulations). April was a month of mixed results in the UK.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

A token acts as an electronic cryptographic key that unlocks the device or application, usually with an encrypted password or biometric data. Disconnected tokens are generally only good for one use and can be delivered via RFID or Bluetooth, or users can manually enter them into the computer. Rise of multi-factor authentication.