Remove 09
Remove 2020 Remove Document Remove Government Remove Presentation Remove Security
article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

The group behind this activity is the same we identified in the past malicious operations described in Roma225 (12/2018), Hagga (08/2019), Mana (09/2019), YAKKA (01/2020). All campaigns used as the initial stage an office document (PowerPoint or Excel) armed with macro and some of them used injection methods.

article thumbnail

Records Inventory 101:

ARMA International

It is a list of each series or system rather than a list of each document or folder. An inventory of an agency’s documents is required as part of a successful records management program, as is the identification of present retention schedules or the design of new retention schedules for those records.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20

Privacy 94