article thumbnail

What are the Drivers of Electronic Records Management (ERM)?

AIIM

Virtually all new records are created electronically today – they are what we call “born digital.” Whether a record is in the format of a letter, an email, fax, a web, or other transaction, the chances are today that it originally was created with one or more computers. Good practice. Effectiveness. With any paper?based

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finding the treasure in governement information management

CILIP

Asked why he chose the Civil Service above other areas of librarianship, David says: “It is just so interesting… it puts you in the centre of constantly changing challenges while offering unparalleled opportunities to move between librarianship, records management, knowledge management, information governance throughout your career.”

article thumbnail

Rethinking Acceptable Use Polices

AIIM

A staple of many Information Technology (IT) policy suites is the Acceptable Use Policy (AUP), intended to govern what people working in the organization can and cannot do with the technology we provide them. Let's take a typical example. So the burden of detailing how people should behave when using computers fell to the IT people.

article thumbnail

GDPR and The Data Governance Imperative

AIIM

GDPR and the Data Governance Imperative. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. The Information Governance Imperative.

GDPR 91
article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’re most likely to access data on your work computer or via paper records, but information can be found in many places. For example, data can be held on removable disks, laptops, servers, personal devices and physical records. The second sub-category of information security relates to the protection electronic information.

article thumbnail

IBM Cloud delivers enterprise sovereign cloud capabilities

IBM Big Data Hub

IBM’s Enterprise Cloud for Regulated Industries Building on our expertise working with enterprise clients in industries such as financial services, government, healthcare and telco, we saw the need for a cloud platform designed with the unique needs of these heavily regulated industries in mind.

Cloud 78