Remove links-resources
article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

discovery demands against the requirements of Europe’s General Data Protection Regulation (GDPR). Data protection laws such as the GDPR define “personal information” broadly, including any name, email address, physical address, or other information that allows identification of any data subject. See, inter alia , Laydon v.

article thumbnail

7 Benefits of Metadata Management

erwin

Metadata management is key to wringing all the value possible from data assets. However, most organizations don’t use all the data at their disposal to reach deeper conclusions about how to drive revenue, achieve regulatory compliance or accomplish other strategic objectives. Quite simply, metadata is data about data.

Metadata 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Process Modeling Use Cases and Definition

erwin

According to Gartner , BPM links business strategy to IT systems development to ensure business value. Compliance: Regulations like the E.U.’s s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are requiring businesses across industries to think about their compliance efforts.

article thumbnail

Vulnerability Management as a Service: Top VMaaS Providers

eSecurity Planet

According to the Verizon Data Breach Investigations Report , 39% of data breaches came from web application compromise, which can often be a result of organizations leveraging open-source code, which can lead to the mess of dependencies that became apparent in vulnerabilities like Log4j Log4Shell and Apache Commons Text4Shell.

Cloud 124
article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

On May 28, 2019, the Cyberspace Administration of China (“ CAC “) released the draft Measures on the Administration of Data Security (“ Data Security Measures ” see our in-house English translation here ) for public consultation. The scope of application of the Data Security Measures.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No. CCPA Background. 17-0039). The CCPA does not define “household.”

Privacy 58
article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

Find it at [link] Written with assistance from Ronke' Ekwensi The whole is more than the sum of its parts: That’s Information Governance. In its essence, Information Governance is the integrative effectiveness varied stakeholders create when they cooperatively process information and share resources for the good of their organization.

IT 40