Thu.Nov 23, 2017

article thumbnail

Data breach hits Department of Social Services credit card system

The Guardian Data Protection

Exclusive: Data includes employees’ names, user names, work phone numbers, work emails and system passwords The Department of Social Services has written to 8,500 current and former employees warning them their personal data held by a contractor has been breached. In letters sent in early November the department alerted the employees to “a data compromise relating to staff profiles within the department’s credit card management system prior to 2016”.

article thumbnail

Reader favorites November 2017: Our most popular RIM resources

TAB OnRecord

This month's roundup of popular resources covers document imaging, RIM outsourcing, and shared drive management. Guide: A best practice template for your imaging project This planning template provides a framework to help you create your own document imaging plan. Packed with tips and guidance on how to complete each section, the template helps ensure that… Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

People and products: Venu Kalla on OpenText Active Intelligence

OpenText Information Management

Venugopal Kalla, better known to his colleagues and friends as Venu, is a Principal Engineer at OpenText. He’s been part of Team OpenText for ten years now, and today enjoys mentoring and supporting several teams and working on OpenText™ Active Intelligence. In this Q&A, Venu reveals more about the work he does: OT: What is … The post People and products: Venu Kalla on OpenText Active Intelligence appeared first on OpenText Blogs.

81
article thumbnail

Uber attempted to cover up a data breach affecting 57 million people

IT Governance

Uber paid criminal hackers $100,000 (£75,000) to delete personal data belonging to its customers and drivers, the company has confirmed. The transport app company was breached in October 2016, and the criminals behind the hack offered to delete the data in exchange for money. Uber took the offer and ignored its legal requirement to disclose the breach, only admitting its error when Bloomberg uncovered the cover-up.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Implementing a Clean Desk Policy for Your Organisation

Archive Document Data Storage

A clean desk policy isn’t just about aesthetics; it’s an important tool for preventing privacy breaches in the workplace. But how do you implement a clean desk policy in your organisation and make it stick? In this blog, we offer best practices for doing exactly that. Clearly Communicate Goals. A clean desk policy benefits your organisation by eliminating identity theft and business fraud.

More Trending

article thumbnail

Mozilla's Guide to Privacy-Aware Christmas Shopping

Schneier on Security

Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more.

Privacy 50
article thumbnail

New PCI DSS webinar series just launched

IT Governance

The Payment Card Industry Data Security Standard (PCI DSS) was created to enhance cardholder data security. It is the result of collaboration between the major credit card brands: American Express, Discover, JCB, MasterCard and Visa. Any merchant or service provider that processes, transmits or stores cardholder data is required to comply with the Standard.

GDPR 65
article thumbnail

3 Lessons to Learn from the Uber Breach

eSecurity Planet

What you do in response to a breach is just as important as what you may or may not have done to prevent it.

IT 43
article thumbnail

ICO issues warning to charity workers

IT Governance

The Information Commissioner’s Office (ICO) has issued a warning to charity workers informing them that they must “obey strict privacy laws”. The warning follows the prosecution of a charity worker for making personal copies of sensitive data and sending them to a personal email account without the knowledge of his employer, Rochdale Connections Trust.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Joseph Wood Krutch Goes Green…in 1952!

Archives Blogs

Joseph Wood Krutch (November 25, 1893 – May 22, 1970), American writer, critic, and naturalist. ( Unknown/Wikipedia Commons ). “What is a nature writer?” Joseph Wood Krutch asks the audience at this 1952 Book and Authors Luncheon. He realizes the term is vaguely derogatory or dismissive, most people’s attitude being that writing about nature “is not doing anyone harm, is it?

article thumbnail

Schliemann’s ‘Troja’: from Ohio to Oxford

Archives Blogs

Books are a vehicle for transmitting information through the written word, but they are also objects, things, material culture. Like other objects, they are created, have ‘lives’, and will, eventually, ‘die’ They can be bought and sold, possessed, hidden, cached, discarded, exchanged and displayed. Books, like other products of human activity, have meaning in addition to their function as texts.