Remove Digital transformation Remove Examples Remove Exercises Remove Security
article thumbnail

Think differently about data privacy to deliver digital transformation

Collibra

Although much of the ink spilled around data privacy focuses on obeying regulations such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), it’s a mistake to think about data privacy as a compliance exercise. This is the road to digital transformation.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

For example, data collected by an entity may not be associated with an individual but could identify a household. Also, entities under the CCPA must post a “Do Not Sell My Personal Information” link on their websites allowing consumers to easily exercise their right of opting-out. (4) 4) The right of Californians to access their PI.

Privacy 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Management in the Not-So-Distant Future of Health Care

AIIM

As health care digitally transforms, more care will come via webs of smart virtual processes that warp and weave, engaging with your data and delivering insights about treatment. The classic example is the insurer that won’t pay for care that a doctor determines a patient needs. Information Security.

article thumbnail

12 Steps to Data Intelligence: Part 1

Collibra

For example, oil is hoarded by the few whereas data must be ubiquitous and shared. Tech security. It takes security to grant access, compliance to make sure the access doesn’t violate industry mandates, technologists to extract different sources and formats, data scientists to help build lineage and transparency, etc. .

article thumbnail

Incident management vs. problem management: What’s the difference?

IBM Big Data Hub

An increase in organizations pursuing digital transformation and other technology-driven operations makes incident management even more important given the dependence on technology to deliver solutions to customers. Teams will quickly understand if this is an honest and supportive exercise or not.

Access 60
article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

However, keeping these old systems running can use up resources that would be better deployed driving digital transformation. And relying on legacy technology creates business risk because these older systems are much harder to fix when things go wrong and more vulnerable to security threats.

ECM 167
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

I’m talking about cybercrime unicorns, talking the fog of cyberwar among nation states, and about a new book that I think will be on the shelves of every information security professional later this summer. Vamosi: The slogan of the RSA Conference is “Where the World Talks Security,” and, in general. It’s not.