Remove 12
Remove 2013 Remove Definition Remove Government Remove Risk
article thumbnail

Finding the treasure in governement information management

CILIP

Asked why he chose the Civil Service above other areas of librarianship, David says: “It is just so interesting… it puts you in the centre of constantly changing challenges while offering unparalleled opportunities to move between librarianship, records management, knowledge management, information governance throughout your career.”

article thumbnail

Weekly podcast: A recap of the top stories of 2017 and a look ahead to 2018

IT Governance

This week, we look back at the big news from last year, and consider what the next 12 months have in store. Hello and welcome to the first IT Governance podcast of 2018. As it’s the first one, let’s have a brief recap of some of last year’s biggest stories, and then look ahead to what we can expect from the next 12 months.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Information and data are synonyms but have different definitions. Introduction.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Although these proportionality factors began as an integral part of the definition of the scope of discovery, for more than two decades these limitations resided in a separate subsection of the Rule, resulting in considerable confusion and less-than-rigorous enforcement. 21 If it is not both relevant and proportional, it is not discoverable.

Privacy 97
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. change it substantially.

GDPR 120
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 April 2024

IT Governance

Only 2 definitely haven’t had data breached. Police launch investigation into spear phishing attack on MPs Leicestershire Police have begun an inquiry after 12 people working in Westminster reported that they had received unsolicited WhatsApp messages. 114 of them are known to have had data exfiltrated, exposed or otherwise breached.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Normally account take overs are due to insecure passwords or recovery options, this is definitely something different. Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. — Dave Kennedy (@HackingDave) July 15, 2020.