Sun.Feb 11, 2018

article thumbnail

Vendor compliance management is more than just a compliance manual

OpenText Information Management

In the retail sector, vendor compliance programs exist to reduce the time and effort it takes get the product to customers. To help reduce “time to customer”, retailers publish vendor compliance manuals with standards and expectations for doing business with them. (Note – if you do a web search for “vendor compliance manual” you can … The post Vendor compliance management is more than just a compliance manual appeared first on OpenText Blogs.

article thumbnail

Befuddled by BYOD? The Sedona Conference Has a New Set of Principles to Guide You: eDiscovery Best Practices

eDiscovery Daily

Many organizations are permitting (or even encouraging) their employees to use their own personal devices to access, create, and manage company related information – a practice commonly referred to as Bring Your Own Device (BYOD). But, how can those organizations effectively manage those BYOD devices to meet their discovery obligations? To help with that issue, The Sedona Conference® (TSC) has published an initial Public Comment Version of a Commentary to help.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Believable denials

InfoGovNuggets

“Equifax Denies Breach Of Passport Numbers,” The Wall Street Journal , February 8, 2018 B10. In the hack of its files, Equifax admits exposing information of perhaps 145 million people. Social Security numbers, stuff like that. And credit card numbers and driver’s license numbers. Senator E. Warren says the hack also exposed passport numbers.

Risk 28
article thumbnail

AI just at the early stages of showing real results

Information Management Resources

Pioneer healthcare organizations, such as the Cleveland Clinic, Intermountain Healthcare and MedStar Health, are beginning to draw some benefits from AI.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Uber settles

InfoGovNuggets

“Uber Settles Trade-Secrets Case,” The Wall Street Journal , February 10, 2018 B1. Uber pays more than $240 million to settle case, and agrees not to use certain technology on self-driving cars, allegedly belonging to Waymo. The agreement not to use was worth perhaps $250 million. How does your company make sure it isn’t using a third party’s intellectual property without permission?

More Trending

article thumbnail

The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries

Troy Hunt

A couple of years back as the US presidential campaign was ramping up, the Trump camp did something stupid. I know, we're all shocked but bear with me because it's an important part of the narrative of this post. One of their developers embedded this code in the campaign's donation website: <script src="[link] type="text/javascript></script> See the problem?

article thumbnail

Encryption keeps us safe. It must not be compromised with ‘backdoors’ | Robby Mook

The Guardian Data Protection

As Hillary Clinton’s campaign manager I know how vital secure communication is. Giving officials access to our data threatens everyone In the spring of 2016, I was told that the Democratic National Committee had been hacked , probably by Russians. Immediately, I was concerned that the campaign I managed, Hillary for America, had been hacked too. We wouldn’t know for months whether it had (to the best of our current knowledge, it never was, although private accounts of campaign staff and advisers