Remove 12
Remove 2012 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

Finding the treasure in governement information management

CILIP

Do they have different tolerances to information management risk? Treasure Another exotic, but ‘live’ part of David’s records collection are the War Risk Indemnity records. Regulatory load With burgeoning amounts of information and regulation, is the job getting harder? Who has the regulatory responsibility?

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13. Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample.

Privacy 97
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. With offerings such as World-Check, it plays a key role in Europe and globally in helping many private sector firms and public authorities identify potential risks in their supply chains, customers and business relationships.

GDPR 120