Remove 12
Remove 2013 Remove Computer and Electronics Remove Government Remove Privacy Remove Security
article thumbnail

Finding the treasure in governement information management

CILIP

Asked why he chose the Civil Service above other areas of librarianship, David says: “It is just so interesting… it puts you in the centre of constantly changing challenges while offering unparalleled opportunities to move between librarianship, records management, knowledge management, information governance throughout your career.”

article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts? In this essay, Robert D.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Noble Lords will be familiar with the role of the Information Commissioner, whose role is to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals.

GDPR 120
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Binni Shah | @binitamshah.

article thumbnail

The ‘MartyMcFly’ investigation: Italian naval industry under attack

Security Affairs

Experts at Yoroi’s Cyber Security Defence Center along with Fincantieri’s security team investigated the recently discovered Martymcfly malware attacks. Background. On October 17th we disclosed the ‘MartyMcFly’ Threat ( Rif. Analysis ) where unknown attackers were targeting Italian naval industries. Malicious Email.