Remove 12
Remove 2018 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

FERC also used the rule to direct NERC to expand scope of the Reliability Standards so that they covered Electronic Access Control and Monitoring Systems (“EACMS”) associated with medium and high impact bulk electric system (“BES”) Cyber Systems. FERC’s final rule, issued on October 18, 2018, closely follows its proposed rulemaking.

Risk 66
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Benefits and Risks. Each type of IoB device brings with it benefits and risks. Wearable technology began as any kind of electronic device designed to be worn on the user’s body. These devices can take many forms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finding the treasure in governement information management

CILIP

Do they have different tolerances to information management risk? Sharepoint came in 2018 and we could give named individuals in that third party company access to a particular area of our Sharepoint where we transferred the material due for the Public Inquiry. Who has the regulatory responsibility? Who answers the FOI requests?

article thumbnail

AI, Records, and Accountability

ARMA International

The risks and harms posed by AI will have to be addressed at a societal level and at an organizational level. Records management should have a role in addressing some of the risks posed by AI given its mission of creating reliable records and its ethical core value of promoting accountability. Definitions of AI.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

11:10 AM – 12:10 PM: Data Subject Access Requests in the Americas and Beyond. Attend this session to learn how leading legal teams are meeting these challenges, and designing workflow that complement features within Relativity. Speakers Include: Wendy King – Sr. Employee DSARs are a huge headache for multinationals.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13. Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample.

Privacy 94